When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://r.sec-consult.com/arturia |
|
History
Wed, 18 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 18 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation. | |
| Title | World-writable uninstall script executed as root in Arturia Software Center | |
| Weaknesses | CWE-276 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-03-18T15:52:07.784Z
Reserved: 2026-01-21T11:29:19.853Z
Link: CVE-2026-24063
Updated: 2026-03-18T15:50:44.234Z
Status : Received
Published: 2026-03-18T16:16:26.527
Modified: 2026-03-18T16:16:26.527
Link: CVE-2026-24063
No data.
OpenCVE Enrichment
No data.