When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arturia
Arturia software Center |
|
| Vendors & Products |
Arturia
Arturia software Center |
Wed, 18 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 18 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation. | |
| Title | World-writable uninstall script executed as root in Arturia Software Center | |
| Weaknesses | CWE-276 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-03-18T15:52:07.784Z
Reserved: 2026-01-21T11:29:19.853Z
Link: CVE-2026-24063
Updated: 2026-03-18T15:50:44.234Z
Status : Awaiting Analysis
Published: 2026-03-18T16:16:26.527
Modified: 2026-03-19T13:25:00.570
Link: CVE-2026-24063
No data.