CVE-2023-27529
📋 TL;DR
This vulnerability in Wacom Tablet Driver installer for macOS allows arbitrary code execution with root privileges when a user is tricked into running a malicious script before the installer. Attackers can exploit improper link resolution to escalate privileges and take full control of affected systems. Users of Wacom tablets on macOS with outdated drivers are at risk.
💻 Affected Systems
- Wacom Tablet Driver for macOS
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level persistence, data theft, ransomware deployment, or backdoor installation.
Likely Case
Local privilege escalation leading to unauthorized access to sensitive files and system resources.
If Mitigated
Limited impact if users have updated drivers and practice safe execution habits.
🎯 Exploit Status
Requires user interaction and specific timing (script must run before installer).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.2-1 and later
Vendor Advisory: https://www.wacom.com/en-us/support/product-support/drivers
Restart Required: No
Instructions:
1. Visit Wacom driver download page 2. Download latest driver for macOS 3. Run installer 4. Follow installation prompts
🔧 Temporary Workarounds
Avoid untrusted scripts
allDo not execute scripts from untrusted sources, especially before running installers
Use Gatekeeper restrictions
macOSEnable macOS Gatekeeper to block unsigned applications
sudo spctl --master-enable
🧯 If You Can't Patch
- Restrict user privileges to prevent script execution with elevated rights
- Implement application whitelisting to block unauthorized installer execution
🔍 How to Verify
Check if Vulnerable:
Check Wacom driver version in System Preferences > Wacom Tablet or via terminal: find /Library/Application\ Support/Tablet -name '*.plist' | xargs grep -l 'Version'
Check Version:
grep -A1 CFBundleVersion /Library/Application\ Support/Tablet/*.plist 2>/dev/null | grep string
Verify Fix Applied:
Confirm driver version is 6.4.2-1 or higher using same method
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution as root from user directories
- Wacom installer execution preceded by script execution
Network Indicators:
- None - local exploitation only
SIEM Query:
process where parent_process_name contains 'install' and process_name contains 'sh' or 'bash' and user='root'