Description

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE — were not intercepted by ClearanceKit's opfilter system extension, allowing local processes to bypass file access policies. Commit 6181c4a patches the vulnerability by subscribing to both event types and routing them through the existing policy evaluator. Users must upgrade to v4.2.4 or later and reactivate the system extension.

INFO

Published Date :

2026-03-26T19:32:49.565Z

Last Modified :

2026-03-27T13:58:53.489Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33632 vulnerability.

Vendors Products
Craigjbass
  • Clearancekit
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33632.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability