Cyber Posture

CVE-2026-24062

High

Published: 18 March 2026

Published
18 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24062 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Sec Consult (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SA-19 (Component Authenticity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires verification of client component authenticity prior to establishing a connection with the privileged helper, directly mitigating the insufficient code signature validation vulnerability.

prevent

Enforces approved authorizations for access to the privileged helper, preventing unauthorized clients from executing privileged actions leading to escalation.

prevent

Limits privileges of the helper component to the minimum necessary, reducing the impact of local privilege escalation even if validation is bypassed.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct local privilege escalation via missing client authentication on a privileged helper tool (CWE-306).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The "Privileged Helper" component of the Arturia Software Center (MacOS) does not perform sufficient client code signature validation when a client connects. This leads to an attacker being able to connect to the helper and execute privileged actions leading to…

more

local privilege escalation.

Deeper analysisAI

CVE-2026-24062 is a vulnerability in the "Privileged Helper" component of the Arturia Software Center on macOS. The issue arises from insufficient client code signature validation when a client connects to the helper, enabling an attacker to perform privileged actions that lead to local privilege escalation. Published on 2026-03-18, it is associated with CWE-306 (Missing Authentication for Critical Function) and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high impact on confidentiality, integrity, and availability.

A local attacker with low privileges (PR:L) can exploit this vulnerability given its low attack complexity (AC:L) and lack of required user interaction (UI:N). By connecting to the privileged helper without adequate signature checks, the attacker gains the ability to execute arbitrary privileged actions, achieving full local privilege escalation from a standard user context.

Mitigation details are available in the security advisory published by SEC Consult at https://r.sec-consult.com/arturia.

Details

CWE(s)

Affected Products

Sec Consult
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-20803Shared CWE-306
CVE-2025-48572Shared CWE-306
CVE-2026-6348Shared CWE-306
CVE-2026-33788Shared CWE-306
CVE-2026-26160Shared CWE-306
CVE-2026-0492Shared CWE-306
CVE-2026-26159Shared CWE-306
CVE-2026-24068Shared CWE-306
CVE-2026-25192Shared CWE-306
CVE-2026-26055Shared CWE-306

References