Description
It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID reuse attacks.
INFO
Published Date :
2026-02-02T13:23:51.846Z
Last Modified :
2026-02-03T14:42:22.938Z
Source :
SEC-VLab
AFFECTED PRODUCTS
The following products are affected by CVE-2026-24071 vulnerability.
| Vendors | Products |
|---|---|
| Native-instruments |
|
| Native Instruments |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-24071.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact