CVE-2025-1078
📋 TL;DR
This vulnerability in AlDente Charge Limiter allows local attackers to bypass authorization checks in the XPC service, potentially enabling unauthorized privileged hardware operations. It affects macOS users running AlDente Charge Limiter versions up to 1.29. The vulnerability requires local access to the system.
💻 Affected Systems
- AppHouseKitchen AlDente Charge Limiter
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access could execute privileged operations on hardware components, potentially damaging battery systems or bypassing charge limiting controls.
Likely Case
Local privilege escalation allowing unauthorized users to modify battery charging settings or perform other privileged operations.
If Mitigated
With proper access controls and updated software, the risk is limited to authorized users only.
🎯 Exploit Status
Exploit requires local access and has been publicly disclosed. The vulnerability is in the shouldAcceptNewConnection function which handles XPC service authorization.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.30
Vendor Advisory: Not specified in provided references
Restart Required: Yes
Instructions:
1. Open AlDente Charge Limiter. 2. Check for updates in the application menu. 3. Install version 1.30 or later. 4. Restart the application and system if prompted.
🔧 Temporary Workarounds
Disable AlDente XPC Service
macOSTemporarily disable the vulnerable XPC service component
sudo launchctl unload /Library/LaunchDaemons/com.apphousekitchen.aldente-pro.helper.plist
🧯 If You Can't Patch
- Restrict local access to affected systems
- Monitor for unauthorized privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check AlDente version in application settings or run: defaults read /Applications/AlDente.app/Contents/Info.plist CFBundleShortVersionString
Check Version:
defaults read /Applications/AlDente.app/Contents/Info.plist CFBundleShortVersionString
Verify Fix Applied:
Verify version is 1.30 or higher using the same command
📡 Detection & Monitoring
Log Indicators:
- Unauthorized XPC connection attempts to com.apphousekitchen.aldente-pro.helper
- Privileged operations from non-admin users
Network Indicators:
- Local inter-process communication attempts to XPC service
SIEM Query:
process_name:"AlDente" AND event_type:"privilege_escalation" OR process_name:"com.apphousekitchen.aldente-pro.helper" AND connection_attempt:failed