🔐 CVE Alert

CVE-2026-24068

HIGH 8.8

Missing XPC Client & NSXPC endpoint validation leads to privilege escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
13th

The VSL privileged helper does utilize NSXPC for IPC. The implementation of the "shouldAcceptNewConnection" function, which is used by the NSXPC framework to validate if a client should be allowed to connect to the XPC listener, does not validate clients at all. This means that any process can connect to this service using the configured protocol. A malicious process is able to call all the functions defined in the corresponding HelperToolProtocol. No validation is performed in the functions "writeReceiptFile" and “runUninstaller” of the HelperToolProtocol. This allows an attacker to write files to any location with any data as well as execute any file with any arguments. Any process can call these functions because of the missing XPC client validation described before. The abuse of the missing endpoint validation leads to privilege escalation.

CWE CWE-306
Vendor vienna symphonic library gmbh
Product vienna assistant
Published Mar 26, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for vienna symphonic library gmbh vienna assistant

Be the first to know when new high vulnerabilities affecting vienna symphonic library gmbh vienna assistant are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Vienna Symphonic Library GmbH / Vienna Assistant
1.2.542

References

NVD ↗ CVE.org ↗ EPSS Data ↗
r.sec-consult.com: https://r.sec-consult.com/vsl seclists.org: http://seclists.org/fulldisclosure/2026/Apr/3

Credits

Florian Haselsteiner, SEC Consult Vulnerability Lab