Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11921: CWE-732 Incorrect Permission Assignment for Critical Resource in Bjango iStats

0
High
VulnerabilityCVE-2025-11921cvecve-2025-11921cwe-732cwe-77
Published: Mon Nov 24 2025 (11/24/2025, 14:22:12 UTC)
Source: CVE Database V5
Vendor/Project: Bjango
Product: iStats

Description

iStats contains an insecure XPC service that allows local, unprivileged users to escalate their privileges to root via command injection.This issue affects iStats: 7.10.4.

AI-Powered Analysis

AILast updated: 12/19/2025, 16:53:20 UTC

Technical Analysis

CVE-2025-11921 is a vulnerability identified in Bjango's iStats application version 7.10.4, involving an insecure XPC (interprocess communication) service that improperly assigns permissions to a critical resource. The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) and CWE-77 (Command Injection). The insecure XPC service allows local, unprivileged users to execute arbitrary commands with root privileges by exploiting command injection flaws. This means an attacker with local access can escalate their privileges to root without requiring authentication or user interaction. The vulnerability was published on November 24, 2025, with a CVSS v4.0 base score of 8.5, indicating high severity. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H, I:H, A:H), meaning successful exploitation could lead to full system compromise. No known public exploits are currently reported, but the vulnerability poses a significant threat due to the ease of exploitation and the critical nature of privilege escalation. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation strategies. The vulnerability affects only version 7.10.4 of iStats, a macOS system monitoring tool popular among professionals and enterprises for system performance tracking.

Potential Impact

The primary impact of CVE-2025-11921 is local privilege escalation, allowing an attacker with local access to gain root privileges on affected macOS systems running iStats 7.10.4. This can lead to complete system compromise, including unauthorized access to sensitive data, installation of persistent malware, disabling of security controls, and disruption of system availability. For European organizations, especially those in sectors with high macOS usage such as creative industries, software development, and certain government agencies, this vulnerability poses a critical risk. Attackers could leverage this flaw to move laterally within networks, escalate privileges on critical endpoints, and potentially exfiltrate confidential information or disrupt operations. The vulnerability's exploitation does not require user interaction or authentication, increasing the risk of automated or insider attacks. Given the lack of known public exploits, the threat is currently theoretical but could rapidly escalate once exploit code becomes available. The impact is magnified in environments where local user accounts are shared or poorly controlled, such as in educational institutions or collaborative workspaces common in Europe.

Mitigation Recommendations

To mitigate CVE-2025-11921, European organizations should immediately restrict local user access on macOS systems running iStats 7.10.4, ensuring that only trusted users have local login capabilities. Implement strict user account controls and monitor for unusual command execution or privilege escalation attempts via system logs and endpoint detection tools. Disable or restrict the vulnerable XPC service if possible, pending an official patch from Bjango. Employ application whitelisting to prevent unauthorized execution of commands and consider using macOS security features such as System Integrity Protection (SIP) to limit root-level modifications. Regularly audit installed software versions and remove or update vulnerable applications promptly. Engage with Bjango for updates or patches and test any fixes in controlled environments before deployment. Additionally, educate users about the risks of local privilege escalation and enforce strong physical security controls to prevent unauthorized local access to devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Fluid Attacks
Date Reserved
2025-10-17T17:02:17.363Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69246d8d7150efb62b9155c0

Added to database: 11/24/2025, 2:37:01 PM

Last enriched: 12/19/2025, 4:53:20 PM

Last updated: 1/8/2026, 8:12:41 PM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats