CVE-2024-4395
📋 TL;DR
This vulnerability in Jamf Compliance Editor's XPC service allows local attackers to escalate privileges on macOS systems. Attackers can gain root access by exploiting improper privilege management in the audit functionality. Only macOS systems running Jamf Compliance Editor versions before 1.3.1 are affected.
💻 Affected Systems
- Jamf Compliance Editor
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full root privileges, enabling complete system compromise, data theft, persistence mechanisms, and lateral movement.
Likely Case
Malicious local user or malware escalates to root to install backdoors, disable security controls, or access sensitive system files.
If Mitigated
With proper privilege separation and least privilege principles, impact is limited to the compromised user's context only.
🎯 Exploit Status
Exploit details are publicly available and the vulnerability is in a local service, making exploitation straightforward for attackers with local access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.1
Vendor Advisory: https://trusted.jamf.com/docs/establishing-compliance-baselines#support
Restart Required: Yes
Instructions:
1. Download Jamf Compliance Editor v1.3.1 from official sources. 2. Uninstall previous versions. 3. Install v1.3.1. 4. Restart the system to ensure all services are updated.
🔧 Temporary Workarounds
Disable Jamf Compliance Editor Service
allTemporarily disable the vulnerable XPC service until patching can be completed.
sudo launchctl unload /Library/LaunchDaemons/com.jamf.compliance.editor.plist
sudo rm /Library/LaunchDaemons/com.jamf.compliance.editor.plist
Restrict Local Access
allImplement strict local access controls and monitor for suspicious privilege escalation attempts.
🧯 If You Can't Patch
- Remove Jamf Compliance Editor from affected systems entirely
- Implement strict application control policies to prevent unauthorized process execution
🔍 How to Verify
Check if Vulnerable:
Check if Jamf Compliance Editor is installed and if version is below 1.3.1 using: find /Applications -name '*Jamf*Compliance*Editor*' -type d
Check Version:
defaults read /Applications/Jamf\ Compliance\ Editor.app/Contents/Info.plist CFBundleShortVersionString
Verify Fix Applied:
Verify installed version is 1.3.1 or higher and check that the XPC service is properly updated.
📡 Detection & Monitoring
Log Indicators:
- Unexpected privilege escalation attempts
- Suspicious XPC service interactions
- Unauthorized root access from Jamf Compliance Editor processes
Network Indicators:
- Local inter-process communication anomalies
SIEM Query:
process_name="Jamf Compliance Editor" AND event_type="privilege_escalation"
🔗 References
- https://github.com/Jamf-Concepts/jamf-compliance-editor/raw/v1.3.1/Jamf%20Compliance%20Editor%20-%20User%20Guide.pdf
- https://github.com/Jamf-Concepts/jamf-compliance-editor/releases/download/v1.3.1/JamfComplianceEditor.v1.3.1.pkg
- https://khronokernel.com/macos/2024/05/01/CVE-2024-4395.html
- https://trusted.jamf.com/docs/establishing-compliance-baselines#support
- https://github.com/Jamf-Concepts/jamf-compliance-editor/raw/v1.3.1/Jamf%20Compliance%20Editor%20-%20User%20Guide.pdf
- https://github.com/Jamf-Concepts/jamf-compliance-editor/releases/download/v1.3.1/JamfComplianceEditor.v1.3.1.pkg
- https://khronokernel.com/macos/2024/05/01/CVE-2024-4395.html
- https://trusted.jamf.com/docs/establishing-compliance-baselines#support