Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65841: n/a

0
Unknown
VulnerabilityCVE-2025-65841cvecve-2025-65841
Published: Wed Dec 03 2025 (12/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "encrypted" through predictable byte-substitution that can be trivially reversed, allowing immediate recovery of the plaintext value. Any attacker who can read this settings file can fully compromise the victim's Aquarius account by importing the stolen configuration into their own client or login through the vendor website. This results in complete account takeover, unauthorized access to cloud-synchronized data, and the ability to perform authenticated actions as the user.

AI-Powered Analysis

AILast updated: 12/03/2025, 17:30:08 UTC

Technical Analysis

CVE-2025-65841 identifies a security vulnerability in Aquarius Desktop version 3.0.069 for macOS, where user authentication credentials are stored insecurely in the local file system at ~/Library/Application Support/Aquarius/aquarius.settings. Instead of using strong cryptographic methods, the application employs a weak obfuscation technique based on predictable byte-substitution to 'encrypt' the password. This method is trivial to reverse, allowing any attacker with read access to this file to recover the plaintext password immediately. Once the attacker obtains the password, they can import the stolen configuration into their own Aquarius client or log in via the vendor’s website, resulting in complete account takeover. This compromise extends to unauthorized access to cloud-synchronized data and the ability to perform any authenticated actions as the victim user. The vulnerability does not require user interaction beyond file access, and no authentication barriers prevent reading the settings file if local access is gained. Although no known exploits are currently reported in the wild, the flaw represents a significant risk due to the ease of exploitation and the critical nature of the compromised credentials. No patches or mitigations have been officially released by the vendor as of the publication date. The vulnerability was reserved on 2025-11-18 and published on 2025-12-03, with no CVSS score assigned yet.

Potential Impact

For European organizations, this vulnerability could lead to severe consequences including unauthorized access to sensitive corporate data synchronized via Aquarius cloud services, potential data leakage, and disruption of business processes relying on the application. Account takeover could allow attackers to manipulate or exfiltrate data, impersonate users, and perform malicious actions under legitimate credentials, undermining trust and compliance with data protection regulations such as GDPR. The risk is heightened in environments where macOS is prevalent and Aquarius Desktop is used for critical workflows or data synchronization. Additionally, organizations with lax endpoint security controls that allow unauthorized local file access are particularly vulnerable. The absence of a patch increases exposure time, and the trivial nature of the exploit means even low-skilled attackers could leverage this vulnerability if they gain local access. This could also facilitate lateral movement within networks if attackers escalate privileges after initial compromise.

Mitigation Recommendations

1. Immediately restrict file system permissions on the ~/Library/Application Support/Aquarius/aquarius.settings file to the minimum necessary, ensuring only the authenticated user and system processes can read it. 2. Implement endpoint monitoring to detect unauthorized access or copying of this settings file, including file integrity monitoring and alerting on suspicious activity. 3. Encourage users to avoid storing sensitive credentials on shared or multi-user systems without proper access controls. 4. Use full disk encryption and strong endpoint security solutions to reduce the risk of local file access by unauthorized parties. 5. Engage with the vendor to demand a security patch that replaces the weak obfuscation with strong cryptographic encryption for stored credentials and to provide guidance on secure credential storage. 6. Until a patch is available, consider disabling cloud synchronization features or limiting use of Aquarius Desktop on macOS in sensitive environments. 7. Educate users about the risks of local file exposure and enforce strict endpoint security policies. 8. Regularly audit macOS endpoints for unauthorized file access and suspicious activity related to Aquarius Desktop files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69306fa987f844e86079960a

Added to database: 12/3/2025, 5:13:13 PM

Last enriched: 12/3/2025, 5:30:08 PM

Last updated: 12/5/2025, 2:33:16 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats