Description
iBoysoft NTFS for Mac contains a local privilege escalation vulnerability in its privileged helper daemon ntfshelperd. The daemon exposes an NSConnection service that runs as root without implementing any authentication or authorization checks.

This issue affects iBoysoft NTFS: 8.0.0.
Published: 2026-03-03
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability involves a privileged helper daemon called ntfshelperd, which is installed at system level to provide NTFS support on macOS. The daemon exposes an NSConnection service that runs with root privileges but does not perform any authentication or authorization checks for incoming requests. As a result, any local user can establish a connection to the daemon and invoke privileged operations, effectively elevating their privileges to root. This weakness aligns with CWE-732, which describes improper permissions for a privileged component.

Affected Systems

The affected product is iBoysoft NTFS for Mac version 8.0.0. No other versions or products are listed in the CVE data. The vulnerability is only present in the stated version of the software on macOS, and any other version or platform should not be impacted unless otherwise reported.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity level. The EPSS score is reported as less than 1 %, suggesting a very low but non‑zero probability of exploitation in the current moment. The vulnerability is not listed in the CISA KEV catalog, which means there are no confirmed exploits yet. The likely attack vector is local: an attacker who can run code on the Mac (for example, a compromised application or a malicious user on the machine) can connect to the nsconnection service and trigger privileged actions without needing any additional credentials.

Generated by OpenCVE AI on April 16, 2026 at 14:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest iBoysoft NTFS update that includes a patch for ntfshelperd, ensuring the daemon checks for proper authentication before accepting connections
  • If an update is not yet available, unload the helper with launchctl unload /Library/LaunchDaemons/com.iboysoft.ntfshelperd.plist to disable the vulnerable service
  • As a temporary measure, block nsconnection traffic to the daemon using macOS firewall rules or by restricting access to the associated socket file

Generated by OpenCVE AI on April 16, 2026 at 14:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Iboysoft ntfs For Mac
CPEs cpe:2.3:a:iboysoft:ntfs_for_mac:8.0:*:*:*:*:*:*:*
Vendors & Products Iboysoft ntfs For Mac
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 03 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description iBoysoft NTFS for Mac contains a local privilege escalation vulnerability in its privileged helper daemon ntfshelperd. The daemon exposes an NSConnection service that runs as root without implementing any authentication or authorization checks. This issue affects iBoysoft NTFS: 8.0.0.
First Time appeared Iboysoft
Iboysoft iboysoft Ntfs
Weaknesses CWE-732
CPEs cpe:2.3:a:iboysoft:iboysoft_ntfs:8.0.0:*:macos:*:*:*:*:*
Vendors & Products Iboysoft
Iboysoft iboysoft Ntfs
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Iboysoft Iboysoft Ntfs Ntfs For Mac
cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2026-03-03T14:35:43.673Z

Reserved: 2026-02-17T19:10:25.606Z

Link: CVE-2026-2637

cve-icon Vulnrichment

Updated: 2026-03-03T14:35:40.411Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-03T15:16:20.950

Modified: 2026-04-27T13:12:44.317

Link: CVE-2026-2637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:15:28Z

Weaknesses