CVE-2026-0924
📋 TL;DR
BuhoCleaner version 1.15.2 contains an insecure XPC service that allows local, unprivileged users to execute arbitrary code with root privileges. This vulnerability affects all users running the vulnerable version of BuhoCleaner on macOS systems.
💻 Affected Systems
- BuhoCleaner
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full root access to the system, enabling complete compromise, data theft, persistence mechanisms, and lateral movement.
Likely Case
Malicious local user or malware escalates privileges to install additional payloads, modify system files, or bypass security controls.
If Mitigated
Attack limited to users with local access; proper privilege separation and monitoring could detect unusual privilege escalation attempts.
🎯 Exploit Status
Exploit requires local user access but is straightforward to execute once local access is obtained. The advisory from Fluid Attacks provides technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.drbuho.com/buhocleaner
Restart Required: No
Instructions:
1. Check vendor website for updated version. 2. Uninstall BuhoCleaner 1.15.2. 3. Install patched version if available. 4. Monitor vendor communications for security updates.
🔧 Temporary Workarounds
Uninstall BuhoCleaner
macOSRemove the vulnerable software to eliminate the attack surface
sudo rm -rf /Applications/BuhoCleaner.app
sudo rm -rf ~/Library/Application\ Support/BuhoCleaner
sudo rm -rf ~/Library/Preferences/com.drbuho.BuhoCleaner.plist
Restrict XPC Service Execution
macOSUse macOS privacy controls to restrict the vulnerable XPC service
🧯 If You Can't Patch
- Remove BuhoCleaner from all systems immediately
- Implement strict local access controls and monitor for privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check if BuhoCleaner version 1.15.2 is installed: ls /Applications/ | grep BuhoCleaner and check version in app info
Check Version:
Check app version in Finder Get Info or run: mdls -name kMDItemVersion /Applications/BuhoCleaner.app
Verify Fix Applied:
Verify BuhoCleaner is either removed or updated to a version later than 1.15.2
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation events
- XPC service abuse logs
- Process execution with unexpected root privileges
Network Indicators:
- Local privilege escalation typically has minimal network indicators
SIEM Query:
process where parent_process_name contains "BuhoCleaner" and user_id changes from non-root to root