Description
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE — were not intercepted by ClearanceKit's opfilter system extension, allowing local processes to bypass file access policies. Commit 6181c4a patches the vulnerability by subscribing to both event types and routing them through the existing policy evaluator. Users must upgrade to v4.2.4 or later and reactivate the system extension.
Published: 2026-03-26
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass
Action: Immediate Patch
AI Analysis

Impact

ClearanceKit is a macOS file‑system access monitoring tool that enforces per‑process file access policies. It contains an operation‑filter system extension that intercepts file operation events. Prior to version 4.2.4, the extension did not handle the ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE event types. A local process able to use these events could therefore perform file operations that bypass the intended policy checks, allowing unauthorized read, write, or execution of files. This constitutes an authorization bypass, potentially exposing sensitive files or facilitating further local privilege escalation.

Affected Systems

The vulnerability affects the CIA software ClearanceKit, developed by craigjbass, on macOS platforms. Any installation of ClearanceKit before v4.2.4 is susceptible, irrespective of specific minor release numbers. All lower versions lack subscription to the two missing event types, and thus are exposed.

Risk and Exploitability

The CVSS base score of 8.4 indicates a high severity. The absence of an EPSS score means we cannot estimate current exploitation likelihood, but the vulnerability is marked as not included in CISA's KEV catalog. The exploit requires a local macro or running code against ClearanceKit, so the likely attack vector is local. The vulnerability has been patched in the public commit 6181c4a, so systems that upgrade mitigate the risk.

Generated by OpenCVE AI on March 26, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ClearanceKit to v4.2.4 or later
  • Reactivate the ClearanceKit system extension

Generated by OpenCVE AI on March 26, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:craigjbass:clearancekit:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Craigjbass
Craigjbass clearancekit
Vendors & Products Craigjbass
Craigjbass clearancekit

Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE — were not intercepted by ClearanceKit's opfilter system extension, allowing local processes to bypass file access policies. Commit 6181c4a patches the vulnerability by subscribing to both event types and routing them through the existing policy evaluator. Users must upgrade to v4.2.4 or later and reactivate the system extension.
Title ClearanceKit: opfilter policy bypass via exchangedata and clone operations
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:L/SI:N/SA:N'}


Subscriptions

Craigjbass Clearancekit
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T13:58:53.489Z

Reserved: 2026-03-23T14:24:11.618Z

Link: CVE-2026-33632

cve-icon Vulnrichment

Updated: 2026-03-27T13:45:08.793Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T20:16:16.277

Modified: 2026-04-21T15:02:26.793

Link: CVE-2026-33632

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:27Z

Weaknesses