The configuration of Mosh-Pro on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Mosh-Pro TCC (Transparency, Consent, and Control) permissions.
Acquired resource access is limited to previously granted permissions by the user. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Mosh-Pro, potentially disguising attacker's malicious intent.
This issue was detected in 1.3.2 version of Mosh-Pro. Since authors did not respond to messages from CNA, patching status is unknown.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cert.pl/en/posts/2025/08/tcc-bypass/ |
![]() ![]() |
https://moshpro.app/ |
![]() ![]() |
History
Wed, 27 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple
Apple macos Mosh Mosh mosh |
|
Vendors & Products |
Apple
Apple macos Mosh Mosh mosh |
Tue, 26 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The configuration of Mosh-Pro on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Mosh-Pro TCC (Transparency, Consent, and Control) permissions. Acquired resource access is limited to previously granted permissions by the user. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Mosh-Pro, potentially disguising attacker's malicious intent. This issue was detected in 1.3.2 version of Mosh-Pro. Since authors did not respond to messages from CNA, patching status is unknown. | |
Title | TCC Bypass via misconfigured Node fuses in Mosh-Pro | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-08-26T14:06:08.863Z
Reserved: 2025-07-09T13:42:44.065Z
Link: CVE-2025-53811

Updated: 2025-08-26T14:02:28.403Z

Status : Awaiting Analysis
Published: 2025-08-26T13:15:32.317
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-53811

No data.