Description

It was found that the XPC service offered by the privileged helper of Native Access uses the PID of the connecting client to verify its code signature. This is considered insecure and can be exploited by PID reuse attacks. The connection handler function uses _xpc_connection_get_pid(arg2) as argument for the hasValidSignature function. This value can not be trusted since it is vulnerable to PID reuse attacks.

INFO

Published Date :

2026-02-02T13:23:51.846Z

Last Modified :

2026-02-03T14:42:22.938Z

Source :

SEC-VLab
AFFECTED PRODUCTS

The following products are affected by CVE-2026-24071 vulnerability.

Vendors Products
Native-instruments
  • Native Access
Native Instruments
  • Native Access
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-24071.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact