HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Intego macOS Antivirus Update Daemon Vulnerable to Local Privilege Escalation via XPC PID Reuse

A newly disclosed vulnerability in Intego's macOS security daemon allows unprivileged users to gain root access by exploiting insecure XPC authentication based on PID reuse. Enterprises using Intego endpoint protection should assess exposure and apply mitigations promptly.

🛡️ LiveThreat™ Intelligence · 📅 March 21, 2026· 📰 blog.quarkslab.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
1 sector(s)
Actions
3 recommended
📰
Source
blog.quarkslab.com

Intego macOS Antivirus Update Daemon Vulnerable to Local Privilege Escalation via XPC PID Reuse

What Happened — Researchers at Quarkslab disclosed a local privilege escalation (LPE) flaw in the com.intego.netupdated daemon, a privileged component of Intego’s macOS security suite. The vulnerability stems from insecure XPC communication that trusts process IDs, allowing an unprivileged user to gain root‑level code execution.

Why It Matters for TPRM

  • LPE in endpoint‑security software can undermine the entire host’s security posture, exposing downstream data and services.
  • Attackers can bypass existing endpoint controls, rendering other vendor‑provided protections ineffective.
  • The flaw highlights the risk of inadequate validation in third‑party security agents that are widely deployed across enterprises.

Who Is Affected — macOS environments that run Intego’s antivirus/anti‑malware products (enterprise laptops, BYOD fleets, managed workstations).

Recommended Actions

  • Verify whether any Intego products are deployed in your environment.
  • Apply any patches or configuration mitigations released by Intego immediately.
  • Conduct a short‑term audit of privileged daemons on macOS endpoints for similar XPC mis‑configurations.
  • Update your endpoint‑security vendor risk assessments to reflect the elevated LPE risk.

Technical Notes — The daemon com.intego.netupdate runs as root and registers a Mach service com.intego.netupdate.daemon.agent. It authorizes requests based on PID reuse, enabling a TOCTOU race condition that bypasses XPC authentication. Exploitation grants arbitrary code execution as root. No CVE number assigned at time of writing. Source: Quarkslab Blog

📰 Original Source
http://blog.quarkslab.com/intego_lpe_macos_3.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.