To fix the issue, update IDrive to version 4.0.0.43 or later and RemotePC to version 7.7.38 or later as soon as possible. If the patch cannot be installed, the PT SWARM expert recommends restricting write permissions to privileged files. The path to these files for IDrive is as follows:
- /Library/Application Support/IDriveforMac/IDriveHelperTools/bin/newbin/IDriveDaemonHelper
- /Library/Application Support/IDriveforMac/IDriveHelperTools/IDriveDaemon.app/Contents/MacOS/IDriveDaemon
- /Library/Application Support/IDriveforMac/IDriveHelperTools/IDSyncDaemon.app/Contents/MacOS/IDSyncDaemon
The path to RemotePC's privileged files:
- /Library/Application Support/RPCForMac/RemoteDPCSService
- /Library/Application Support/RPCForMac/RemotePCHelper
In 2025, Egor Filatov helped fix vulnerability PT-2025-25226, which also involved privilege escalation. In August, he helped strengthen the security of Tunnelblick, the graphical user interface for OpenVPN. Before the fix, this flaw could have allowed an attacker to compromise data and carry out an attack within a corporate network.
Reduce the risk of remote code execution on endpoints, including when an attacker escalates privileges, with EDR solutions such as MaxPatrol EDR. When malicious activity is detected, these products alert MaxPatrol SIEM and block the attack.
For up-to-date security information, visit the dbugs portal, which aggregates vulnerability data and vendor recommendations for software and hardware from vendors around the world.