Management summary
The Arturia Software Center was found to be vulnerable to local privilege escalation via multiple vectors. The privileged helper utilized by Arturia Software Center via XPC does not perform client validation. When installing a plugin a world writeable uninstall shell script will be installed, which is executed by root when uninstalling. The vendor was unresponsive and no patch is available.
Vendor description
"We create instruments and effects that encourage musical discovery, reward curiosity, and savor the artistic process. We’re an international team of passionate people, on a mission to navigate uncharted sonic territory in the name of creative empowerment. From the raw analog power of Brute synthesizers to our faithful virtual instrument emulations of V Collection, we provide musicians with an inspiring sonic experience that's instantly accessible, exploratory, and thrilling."
Source: https://www.arturia.com/company
Business recommendation
The vendor was unresponsive and did not respond to any of our communication attempts. Therefore, a patch is not available. In case you are using this product, please approach the vendor and demand a fix.
SEC Consult highly recommends to perform a thorough security review of the product conducted by security professionals to identify and resolve potential further security issues.
Vulnerability overview/description
1) Insufficient XPC Client validation (CVE-2026-24062)
It was found that the "Privileged Helper" component of the Arturia Software Center does not perform sufficient client code signature validation when a client connects. This leads to an attacker being able to connect to the helper and execute privileged actions leading to local privilege escalation.
2) World writable uninstall.sh script executed by root (CVE-2026-24063)
It was found that when a plugin is installed using the Arturia Software Center, that this plugin also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead
to privilege escalation.
Proof of concept
1) Insufficient XPC Client validation (CVE-2026-24062)
The Privileged Helper service does not check if the connecting client is signed with a valid code signature. Any process can connect to the privileged helper and trigger privileged actions.
The following C code can be used to connect to the privileged helper and trigger code execution as root. By first using the FINISHM command to achieve /Library/Arturia being a symlink to /tmp/test and then triggering an UNINSTA of /Library/Arturia/uninstall.sh, the attacker controlled bash script in /tmp/test/uninstall.sh will get executed by root. The following example proof of concept sets up the /tmp/test directory as well as the /tmp/test/uninstall.sh script containing commands to add the user lowpriv to the sudoers file.
[ PoC exploit code removed ]The code can be compiled using clang:
clang -o exploit exploit.cAnd then be executed like:
./exploit com.Arturia.InstallHelperThis will trigger execution of /tmp/test/uninstall.sh as root leading to privilege escalation.
2) World writable uninstall.sh script executed by root (CVE-2026-24063)
When a vst is installed via the ASC the following path will be generated:
/Library/Arturia/Acid V/Acid V.vst3/Contents/ResourcesThe following contents are installed:
user@usersVilMachine Resources % ls -al
total 8
drwxrwxrwx 3 root wheel 96 Oct 9 09:27 .
drwxrwxrwx 7 root wheel 224 Oct 9 09:27 ..
-rwxrwxrwx 1 root wheel 3315 Oct 9 09:26 uninstall.sh
user@usersVilMachine Resources % pwd
/Library/Arturia/Acid V/Acid V.vst3/Contents/ResourcesWhen uninstalling the same software via the ASC the following XPC message is sent to the InstallHelper:
UNINSTA /Library/Arturia/Acid V/Acid V.vst3/Contents/Resources/uninstall.shThis will trigger execution of the uninstall.sh file as root. The uninstallation can either be triggerd by exploiting the missing XPC client authentication of the Privileged Helper or by manually triggering the uninstall via the UI.
Vulnerable / tested versions
The following version has been tested which was the latest version available at the time of the test:
- 2.12.0.3157
All tests have been performed on MacOS 26.2 with SIP enabled!