Project Subscriptions
No data.
No advisories yet.
Solution
The vendor was unresponsive and did not respond to any of our communication attempts. Therefore, a patch is not available. In case you are using this product, please approach the vendor and demand a fix.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://r.sec-consult.com/arturia |
|
Wed, 18 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 18 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation. | |
| Title | World-writable uninstall script executed as root in Arturia Software Center | |
| Weaknesses | CWE-276 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-03-18T15:52:07.784Z
Reserved: 2026-01-21T11:29:19.853Z
Link: CVE-2026-24063
Updated: 2026-03-18T15:50:44.234Z
Status : Received
Published: 2026-03-18T16:16:26.527
Modified: 2026-03-18T16:16:26.527
Link: CVE-2026-24063
No data.
OpenCVE Enrichment
No data.