Impact
The vulnerable XPC service in Native Access verifies the code signature of connecting clients by using the PID supplied by the operating system. Because process identifiers are reused, an attacker can trick the privileged helper into accepting a malicious process as a legitimate client, allowing local privilege escalation. This flaw is an instance of improper validation of a resource ownership setting, specifically CWE‑367.
Affected Systems
Native Instruments Native Access, all released versions are affected.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity vulnerability. The EPSS score is reported as less than 1 %, implying a low probability of exploitation, and it is not listed in the CISA KEV catalog. The attack vector is inferred to be local, requiring the attacker to run a malicious process on the same machine to abuse the PID‑reuse flaw. No public exploits are known, but the flaw can be leveraged by an attacker who gains local execution capability to obtain elevated privileges on the host.
OpenCVE Enrichment