Impact
ClearanceKit monitors file‑system operations and enforces per‑process access rules. The flaw treats any process that has an empty Team ID but a non‑empty Signing ID as an Apple system binary. As a result, a malicious application can masquerade as an Apple process in the global allowlist, bypassing all protected‑file restrictions and obtaining unrestricted read/write access to system files.
Affected Systems
The affected product is ClearanceKit from vendor craigjbass. Versions prior to 5.0.5 contain the vulnerability; all later releases are not affected.
Risk and Exploitability
The vulnerability scores a CVSS of 8.4, indicating high severity. No EPSS data is available, and the issue is not listed in the CISA KEV catalog. Exploitation requires local execution of a binary that meets the malformed Team/Signing ID criteria, allowing the attacker to gain privileged file‑system access on macOS systems where ClearanceKit is active.
OpenCVE Enrichment