CVE-2020-27192

7.8 HIGH

📋 TL;DR

CVE-2020-27192 is a local privilege escalation vulnerability in BinaryNights ForkLift 3.4 where the application was compiled with library validation disabled, allowing local attackers to inject malicious code. This enables attackers to execute arbitrary code with elevated privileges through ForkLift's helper tool. Only users running ForkLift 3.4 on macOS are affected.

💻 Affected Systems

Products:
  • BinaryNights ForkLift
Versions: Version 3.4
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ForkLift 3.4 compiled with com.apple.security.cs.disable-library-validation flag enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges on the system, enabling complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local attacker with user access escalates to root privileges to install malware, steal credentials, or access protected system resources.

🟢

If Mitigated

Attack fails due to updated software or proper security controls preventing local code execution.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Internal users with local access can exploit this to gain root privileges on affected systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system and knowledge of code injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ForkLift 3.5.6 and later

Vendor Advisory: https://binarynights.com/

Restart Required: Yes

Instructions:

1. Open ForkLift application. 2. Go to ForkLift menu > Check for Updates. 3. Install available update to version 3.5.6 or later. 4. Restart ForkLift and any related services.

🔧 Temporary Workarounds

Disable ForkLift Helper Tool

all

Remove or disable the ForkLift helper tool that runs with elevated privileges

sudo rm /Library/PrivilegedHelperTools/com.binarynights.ForkLiftHelper
sudo launchctl unload /Library/LaunchDaemons/com.binarynights.ForkLiftHelper.plist

Uninstall ForkLift 3.4

all

Completely remove vulnerable version of ForkLift

sudo rm -rf /Applications/ForkLift.app
sudo rm -rf ~/Library/Application\ Support/ForkLift
sudo rm -rf /Library/PrivilegedHelperTools/com.binarynights.ForkLiftHelper

🧯 If You Can't Patch

  • Restrict local user access to systems running ForkLift 3.4
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check ForkLift version in application menu (ForkLift > About ForkLift). If version is 3.4, system is vulnerable.

Check Version:

defaults read /Applications/ForkLift.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Verify ForkLift version is 3.5.6 or later in application menu. Check that helper tool is updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from ForkLiftHelper
  • Suspicious library loading by ForkLift processes
  • Privilege escalation attempts in system logs

Network Indicators:

  • Unexpected outbound connections from ForkLift processes

SIEM Query:

process_name:"ForkLiftHelper" AND parent_process_name:"ForkLift" AND event_type:"process_start"

🔗 References

📤 Share & Export