Description
It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID reuse attacks.
Published: 2026-02-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Contact Vendor
AI Analysis

Impact

The vulnerable XPC service in Native Access verifies the code signature of connecting clients by using the PID supplied by the operating system. Because process identifiers are reused, an attacker can trick the privileged helper into accepting a malicious process as a legitimate client, allowing local privilege escalation. This flaw is an instance of improper validation of a resource ownership setting, specifically CWE‑367.

Affected Systems

Native Instruments Native Access, all released versions are affected.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity vulnerability. The EPSS score is reported as less than 1 %, implying a low probability of exploitation, and it is not listed in the CISA KEV catalog. The attack vector is inferred to be local, requiring the attacker to run a malicious process on the same machine to abuse the PID‑reuse flaw. No public exploits are known, but the flaw can be leveraged by an attacker who gains local execution capability to obtain elevated privileges on the host.

Generated by OpenCVE AI on April 18, 2026 at 00:39 UTC.

Remediation

Vendor Solution

The vendor was unreachable and did not respond to multiple contact attempts. No patch is available. Customers should contact the vendor and request a patch.


OpenCVE Recommended Actions

  • Contact Native Instruments and request a patch for Native Access.
  • If a patch is not available, consider downgrading to a pre‑vulnerability version until a fix is released.
  • Limit the privileges of users who can run Native Access and monitor the system for suspicious PID reuse activity.

Generated by OpenCVE AI on April 18, 2026 at 00:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Native-instruments
Native-instruments native Access
CPEs cpe:2.3:a:native-instruments:native_access:*:*:*:*:*:*:*:*
Vendors & Products Native-instruments
Native-instruments native Access

Wed, 04 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Native Instruments
Native Instruments native Access
Vendors & Products Native Instruments
Native Instruments native Access

Tue, 03 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Mon, 02 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
Description It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID reuse attacks.
Title XPC Client Validation via PID leading to Local Privilege Escalation in Native Instruments Native Access
Weaknesses CWE-367
References

Subscriptions

Native-instruments Native Access
Native Instruments Native Access
cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-02-03T14:42:22.938Z

Reserved: 2026-01-21T11:29:19.854Z

Link: CVE-2026-24071

cve-icon Vulnrichment

Updated: 2026-02-02T17:01:49.245Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T14:16:35.753

Modified: 2026-02-11T20:39:27.763

Link: CVE-2026-24071

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:45:32Z

Weaknesses