Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, contains a local privilege escalation vulnerability. A root-executed diagnostic script creates and writes files in /tmp without enforcing secure directory handling, introducing a time-of-check to time-of-use (TOCTOU) race condition. A local unprivileged user can exploit a symlink-based race condition to cause arbitrary file writes to privileged system locations, resulting in privilege escalation to root.
History

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Intego
Intego log Reporter
Vendors & Products Intego
Intego log Reporter

Fri, 13 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, contains a local privilege escalation vulnerability. A root-executed diagnostic script creates and writes files in /tmp without enforcing secure directory handling, introducing a time-of-check to time-of-use (TOCTOU) race condition. A local unprivileged user can exploit a symlink-based race condition to cause arbitrary file writes to privileged system locations, resulting in privilege escalation to root.
Title Intego Log Reporter TOCTOU Local Privilege Escalation
Weaknesses CWE-367
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-02-12T21:58:19.803Z

Updated: 2026-02-13T15:43:54.936Z

Reserved: 2026-02-11T20:08:07.945Z

Link: CVE-2026-26224

cve-icon Vulnrichment

Updated: 2026-02-13T15:43:51.639Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-12T22:16:07.320

Modified: 2026-02-13T14:23:48.007

Link: CVE-2026-26224

cve-icon Redhat

No data.