The configuration of Nozbe on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions.
Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.
This issue was fixed in version 2025.11 of Nozbe.
Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.
This issue was fixed in version 2025.11 of Nozbe.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cert.pl/en/posts/2025/08/tcc-bypass/ |
![]() ![]() |
https://nozbe.com/ |
![]() ![]() |
History
Wed, 27 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple
Apple macos Nozbe Nozbe nozbe |
|
Vendors & Products |
Apple
Apple macos Nozbe Nozbe nozbe |
Tue, 26 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The configuration of Nozbe on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions. Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 2025.11 of Nozbe. | |
Title | TCC Bypass via misconfigured Node fuses in Nozbe | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-08-26T13:59:53.451Z
Reserved: 2025-07-09T13:42:44.066Z
Link: CVE-2025-53813

Updated: 2025-08-26T13:59:27.520Z

Status : Awaiting Analysis
Published: 2025-08-26T13:15:32.660
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-53813

No data.

Updated: 2025-08-27T11:41:42Z