Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-61228

CVE-2025-61228: Shirt Pocket SuperDuper! RCE Vulnerability

CVE-2025-61228 is a remote code execution flaw in Shirt Pocket SuperDuper! that allows local attackers to execute arbitrary code via the update mechanism. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-61228 Overview

CVE-2025-61228 is a high-severity local code execution vulnerability affecting Shirt Pocket SuperDuper!, a popular macOS backup and cloning application. The vulnerability exists in the software update mechanism, allowing a local attacker to execute arbitrary code on the target system. This flaw is classified under CWE-494 (Download of Code Without Integrity Check), indicating that the application fails to properly verify the authenticity or integrity of software updates before execution.

The vulnerability carries a CVSS 3.1 score of 7.8, reflecting the significant impact on confidentiality, integrity, and availability when successfully exploited. With an EPSS score of 0.007% (43rd percentile), the probability of active exploitation in the wild remains relatively low but should not be disregarded.

Critical Impact

Local attackers can exploit the insecure software update mechanism to execute arbitrary code with the privileges of the application, potentially leading to complete system compromise on affected macOS systems.

Affected Products

  • Shirt Pocket SuperDuper! version 3.10 and earlier
  • All macOS systems running vulnerable SuperDuper! versions
  • Systems with automatic update mechanisms enabled

Discovery Timeline

  • 2025-12-01 - CVE-2025-61228 published to NVD
  • 2025-12-05 - Last updated in NVD database

Technical Details for CVE-2025-61228

Vulnerability Analysis

The vulnerability resides in SuperDuper!'s software update mechanism. According to CWE-494, the application downloads code (software updates) without properly verifying the integrity or authenticity of the downloaded content. This creates an opportunity for attackers to inject malicious code during the update process.

The CVSS vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H indicates:

  • Attack Vector (AV:L): Local access is required
  • Attack Complexity (AC:L): Low complexity to exploit
  • Privileges Required (PR:L): Low privileges needed
  • User Interaction (UI:N): No user interaction required
  • Impact: High impact on Confidentiality, Integrity, and Availability

Root Cause

The root cause stems from inadequate integrity verification during the software update process. The application fails to implement proper cryptographic signature validation or secure hash verification for downloaded update packages. Without these safeguards, the update mechanism cannot distinguish between legitimate vendor updates and maliciously crafted payloads.

This type of vulnerability typically occurs when:

  • Update packages are downloaded over insecure channels without TLS verification
  • Cryptographic signatures on update packages are not validated
  • Hash integrity checks are missing or improperly implemented
  • The application trusts update content without verification

Attack Vector

An attacker with local access to the system can exploit this vulnerability by intercepting or manipulating the software update process. The attack scenario typically involves:

  1. The attacker positions themselves to intercept update traffic (via ARP spoofing, DNS hijacking, or compromising the local network)
  2. When SuperDuper! checks for or downloads updates, the attacker serves a malicious update package
  3. Due to the lack of integrity verification, the application accepts and executes the malicious payload
  4. The attacker gains code execution with the same privileges as the SuperDuper! application

Since SuperDuper! is a backup application that often requires elevated privileges to access system files, successful exploitation could grant the attacker significant control over the target system.

Detection Methods for CVE-2025-61228

Indicators of Compromise

  • Unexpected network connections from SuperDuper! to unknown or suspicious endpoints
  • Modification of SuperDuper! application files or associated binaries outside of legitimate update windows
  • Anomalous process spawning from the SuperDuper! application
  • Unsigned or improperly signed executables in the SuperDuper! application directory
  • Unexpected privilege escalation attempts following SuperDuper! update activities

Detection Strategies

Organizations should implement monitoring for software update activities, particularly focusing on:

  1. Network Traffic Analysis: Monitor outbound connections from SuperDuper! for connections to non-standard update servers or suspicious domains
  2. File Integrity Monitoring: Track changes to SuperDuper! application files and directories for unauthorized modifications
  3. Process Monitoring: Watch for unexpected child processes spawned by the SuperDuper! application
  4. Code Signing Validation: Verify that all SuperDuper! binaries maintain valid Apple code signatures

SentinelOne Singularity XDR provides behavioral detection capabilities that can identify suspicious activity patterns associated with software update exploitation, including unauthorized code execution and privilege escalation attempts.

Monitoring Recommendations

  • Enable application-level logging for SuperDuper! update activities
  • Configure endpoint detection solutions to alert on unsigned binary execution from application directories
  • Implement network segmentation to limit potential man-in-the-middle attack vectors
  • Utilize SentinelOne's real-time threat detection to identify malicious payloads delivered through compromised update mechanisms
  • Monitor for unusual file system activities in /Applications/SuperDuper!.app/ and related directories

How to Mitigate CVE-2025-61228

Immediate Actions Required

  • Update Shirt Pocket SuperDuper! to version 3.11 or later immediately
  • Disable automatic updates until the patched version is deployed
  • Audit systems for any signs of compromise if vulnerable versions were in use
  • Verify the integrity of existing SuperDuper! installations by checking code signatures
  • Monitor affected systems for suspicious activity during the remediation period

Patch Information

Shirt Pocket has released SuperDuper! version 3.11 as a security update addressing this vulnerability. The patch implements proper integrity verification for the software update mechanism. Administrators should:

  1. Download the update directly from the official Shirt Pocket website
  2. Verify the download integrity using the vendor-provided checksums
  3. Deploy the update to all affected systems
  4. Confirm successful installation by verifying the application version

For detailed release notes, refer to the vendor's security advisory at: https://www.shirtpocket.com/blog/index.php/shadedgrey/comments/superduper_security_update_v311/

Workarounds

If immediate patching is not possible, the following workarounds can reduce exposure:

Organizations unable to immediately update should disable the automatic update feature within SuperDuper! until the patch can be applied. Manual updates should only be performed by downloading directly from the verified vendor website over a trusted network connection.

Additionally, implementing network-level controls to restrict SuperDuper!'s outbound connectivity to only known legitimate Shirt Pocket update servers can help mitigate man-in-the-middle attack scenarios. Endpoint protection solutions like SentinelOne should be configured to monitor and block suspicious execution patterns from backup application directories.

bash
# Verify SuperDuper! version after patching
defaults read /Applications/SuperDuper\!.app/Contents/Info.plist CFBundleShortVersionString
# Expected output: 3.11 or higher

# Check code signature validity
codesign -vv /Applications/SuperDuper\!.app

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechShirt Pocket Superduper

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-494
  • Technical References
  • Not Applicable

  • Product

  • Release Notes
  • Related CVEs
  • CVE-2025-61229: SuperDuper! Privilege Escalation Flaw

  • CVE-2025-57489: SuperDuper! Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English