Description
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE — were not intercepted by ClearanceKit's opfilter system extension, allowing local processes to bypass file access policies. Commit 6181c4a patches the vulnerability by subscribing to both event types and routing them through the existing policy evaluator. Users must upgrade to v4.2.4 or later and reactivate the system extension.
INFO
Published Date :
2026-03-26T19:32:49.565Z
Last Modified :
2026-03-27T13:58:53.489Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33632 vulnerability.
| Vendors | Products |
|---|---|
| Craigjbass |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33632.