CVE-2025-1078

5.3 MEDIUM

📋 TL;DR

This vulnerability in AlDente Charge Limiter allows local attackers to bypass authorization checks in the XPC service, potentially enabling unauthorized privileged hardware operations. It affects macOS users running AlDente Charge Limiter versions up to 1.29. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • AppHouseKitchen AlDente Charge Limiter
Versions: up to 1.29
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Pro version with the XPC service component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could execute privileged operations on hardware components, potentially damaging battery systems or bypassing charge limiting controls.

🟠

Likely Case

Local privilege escalation allowing unauthorized users to modify battery charging settings or perform other privileged operations.

🟢

If Mitigated

With proper access controls and updated software, the risk is limited to authorized users only.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the affected system.
🏢 Internal Only: MEDIUM - Local attackers or malicious insiders could exploit this vulnerability to gain unauthorized privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and has been publicly disclosed. The vulnerability is in the shouldAcceptNewConnection function which handles XPC service authorization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.30

Vendor Advisory: Not specified in provided references

Restart Required: Yes

Instructions:

1. Open AlDente Charge Limiter. 2. Check for updates in the application menu. 3. Install version 1.30 or later. 4. Restart the application and system if prompted.

🔧 Temporary Workarounds

Disable AlDente XPC Service

macOS

Temporarily disable the vulnerable XPC service component

sudo launchctl unload /Library/LaunchDaemons/com.apphousekitchen.aldente-pro.helper.plist

🧯 If You Can't Patch

  • Restrict local access to affected systems
  • Monitor for unauthorized privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check AlDente version in application settings or run: defaults read /Applications/AlDente.app/Contents/Info.plist CFBundleShortVersionString

Check Version:

defaults read /Applications/AlDente.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Verify version is 1.30 or higher using the same command

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized XPC connection attempts to com.apphousekitchen.aldente-pro.helper
  • Privileged operations from non-admin users

Network Indicators:

  • Local inter-process communication attempts to XPC service

SIEM Query:

process_name:"AlDente" AND event_type:"privilege_escalation" OR process_name:"com.apphousekitchen.aldente-pro.helper" AND connection_attempt:failed

🔗 References

📤 Share & Export