Vulnerabilities - Multiple Privilege Escalation Risks Found
Basically, there are security holes in Arturia's software that could let bad actors gain control.
Multiple privilege escalation vulnerabilities have been discovered in Arturia Software Center for MacOS. Users of version 2.12.0.3157 are at risk. Immediate action is needed to secure systems until a fix is available.
The Flaw
Arturia Software Center for MacOS has been found to contain multiple privilege escalation vulnerabilities. Specifically, the issues arise from insufficient validation of client connections and insecure file permissions. The vulnerabilities are identified as CVE-2026-24062 and CVE-2026-24063. These flaws allow attackers to execute privileged actions on the system, potentially leading to unauthorized access and control.
CVE-2026-24062 relates to the Privileged Helper component, which fails to validate the code signature of connecting clients. This oversight allows any process to connect and perform privileged actions. Meanwhile, CVE-2026-24063 involves a world writable uninstall.sh script that can be manipulated by an attacker to escalate privileges when uninstalling plugins. This combination of vulnerabilities poses a serious threat to users of the software.
What's at Risk
The vulnerabilities affect users of Arturia Software Center version 2.12.0.3157. If exploited, these flaws can allow attackers to gain root access to the system, compromising sensitive data and potentially leading to further exploitation. With the vendor unresponsive to requests for a patch, users remain vulnerable until a fix is provided.
The lack of a timely response from Arturia raises concerns about the company's commitment to security. Users should be aware that their systems could be at risk, especially if they rely on this software for critical tasks.
Patch Status
As of now, there is no patch available for these vulnerabilities. SEC Consult has made multiple attempts to contact Arturia for a resolution but received no response. This lack of communication leaves users in a precarious position, as they cannot rely on the vendor to address these security issues.
SEC Consult recommends that users conduct a thorough security review of their systems. This may involve seeking professional assistance to identify and mitigate potential risks associated with these vulnerabilities. Users are encouraged to demand a fix from Arturia and remain vigilant.
Immediate Actions
In light of these vulnerabilities, users should take immediate action to protect their systems. Here are some recommendations:
- Avoid using the Arturia Software Center until a patch is released.
- Monitor for updates from Arturia regarding these vulnerabilities.
- Consider alternative software solutions if immediate action is necessary.
- Conduct a security review of your systems to identify any potential risks.
By staying informed and proactive, users can better protect themselves against the risks posed by these privilege escalation vulnerabilities.
Full Disclosure