CVE-2025-14979

N/A Unknown

📋 TL;DR

AirVPN Eddie on macOS contains an insecure XPC service that allows local, unprivileged users to escalate privileges to root. This affects Eddie version 2.24.6 on macOS systems. Attackers with local access can gain full system control.

💻 Affected Systems

Products:
  • AirVPN Eddie
Versions: 2.24.6
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS version of Eddie. Requires local user access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Malicious local user or malware escalates privileges to install backdoors, steal credentials, or disable security controls.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated systems with quick detection and remediation.

🌐 Internet-Facing: LOW (requires local access, not directly exploitable over network)
🏢 Internal Only: HIGH (local privilege escalation enables attackers to pivot within network)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details published in advisory. Requires local user access but trivial to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for updated version

Vendor Advisory: https://eddie.website/

Restart Required: Yes

Instructions:

1. Check Eddie website for security updates. 2. Download and install latest version. 3. Restart system. 4. Verify Eddie service is updated.

🔧 Temporary Workarounds

Disable Eddie XPC Service

macos

Temporarily disable vulnerable XPC service until patch applied

sudo launchctl unload /Library/LaunchDaemons/com.eddie.client.service.plist
sudo rm /Library/LaunchDaemons/com.eddie.client.service.plist

Remove Eddie

macos

Uninstall vulnerable Eddie version completely

sudo /Applications/Eddie.app/Contents/Resources/uninstall.sh
sudo rm -rf /Applications/Eddie.app

🧯 If You Can't Patch

  • Restrict local user access to affected systems
  • Implement strict privilege separation and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Eddie version: Open Eddie → About. If version is 2.24.6, system is vulnerable.

Check Version:

defaults read /Applications/Eddie.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Verify Eddie version is updated beyond 2.24.6 and XPC service permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized privilege escalation attempts
  • XPC service abuse logs
  • Sudden root privilege acquisition by non-admin users

Network Indicators:

  • None (local exploit only)

SIEM Query:

process_name="Eddie" AND event_type="privilege_escalation" OR parent_process="launchd" AND child_process="sh"

🔗 References

📤 Share & Export