First published: Fri Jan 15 2021(Updated: )
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct a situation where the same PID is used for running two different programs at different times, by leveraging a race condition during crafted use of posix_spawn.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Malwarebytes Anti-Malware | <4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25533 is classified as a high severity vulnerability due to its ability to allow unauthorized privileged actions.
To mitigate CVE-2020-25533, update Malwarebytes to version 4.0 or later on macOS.
The impact of CVE-2020-25533 includes the potential for a malicious application to perform privileged actions within the Malwarebytes service.
Malwarebytes versions prior to 4.0 on macOS are affected by CVE-2020-25533.
CVE-2020-25533 is a local vulnerability, as it requires an attacker to be able to execute code on the affected macOS system.