First published: Tue Jan 04 2022(Updated: )
Netskope client prior to 89.x on macOS is impacted by a local privilege escalation vulnerability. The XPC implementation of nsAuxiliarySvc process does not perform validation on new connections before accepting the connection. Thus any low privileged user can connect and call external methods defined in XPC service as root, elevating their privilege to the highest level.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Netskope | <89 | |
macOS | ||
Netskope | <89 | |
macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41388 is a local privilege escalation vulnerability in Netskope client prior to version 89.x on macOS.
CVE-2021-41388 allows any low privileged user on macOS to connect and call external methods in the nsAuxiliarySvc process of Netskope client prior to version 89.x.
CVE-2021-41388 has a severity rating of 7.8 (high).
To fix CVE-2021-41388, update Netskope client to version 89.x or later.
You can find more information about CVE-2021-41388 in the Netskope Security Advisory NSKPSA-2021-002: [https://www.netskope.com/company/security-compliance-and-assurance/netskope-security-advisory-nskpsa-2021-002](https://www.netskope.com/company/security-compliance-and-assurance/netskope-security-advisory-nskpsa-2021-002).