CVE-2025-57443

5.1 MEDIUM

📋 TL;DR

FrostWire 6.14.0-build-326 for macOS contains permissive entitlements that allow local attackers to inject code via DYLD_INSERT_LIBRARIES environment variable. This enables privilege escalation to access arbitrary TCC-approved directories. Only macOS users running this specific FrostWire version are affected.

💻 Affected Systems

Products:
  • FrostWire
Versions: 6.14.0-build-326
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS due to DYLD_INSERT_LIBRARIES mechanism. Requires local user access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full access to all TCC-protected directories (Documents, Desktop, Downloads, etc.) and can execute arbitrary code with FrostWire's permissions.

🟠

Likely Case

Local attacker accesses sensitive user files in TCC-protected directories or installs persistence mechanisms.

🟢

If Mitigated

Attack limited to user's own files if proper file permissions and TCC restrictions are in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to access other users' TCC-protected directories.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local user access. Public PoC available in GitHub repository. DYLD injection is well-understood attack vector on macOS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

1. Check FrostWire website for updated version. 2. Uninstall vulnerable version. 3. Install patched version if available. 4. Monitor vendor communications for security updates.

🔧 Temporary Workarounds

Remove FrostWire entitlements

macOS

Remove the permissive entitlements (allow-dyld-environment-variables, disable-library-validation) from FrostWire.app

codesign --remove-signature /Applications/FrostWire.app
codesign --sign - --entitlements custom.entitlements /Applications/FrostWire.app

Restrict DYLD environment variables

macOS

System-wide restriction of DYLD environment variables via SIP configuration

sudo nvram boot-args="amfi_get_out_of_my_way=1"
Note: This affects system security and requires reboot

🧯 If You Can't Patch

  • Uninstall FrostWire 6.14.0-build-326 completely from affected macOS systems
  • Implement strict file permissions and monitor for unauthorized access to TCC-protected directories

🔍 How to Verify

Check if Vulnerable:

Check FrostWire version: Open FrostWire → About FrostWire. If version is 6.14.0-build-326, system is vulnerable.

Check Version:

defaults read /Applications/FrostWire.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Verify FrostWire is uninstalled or updated to newer version. Check entitlements: codesign -d --entitlements - /Applications/FrostWire.app 2>/dev/null | grep -E "allow-dyld-environment-variables|disable-library-validation"

📡 Detection & Monitoring

Log Indicators:

  • Unusual process launches from FrostWire
  • Access to TCC-protected directories by FrostWire process
  • DYLD_INSERT_LIBRARIES environment variable being set

Network Indicators:

  • None - this is local privilege escalation

SIEM Query:

process.name:"FrostWire" AND event.action:"file_access" AND file.path:"/Users/*/Documents/*" OR file.path:"/Users/*/Desktop/*" OR file.path:"/Users/*/Downloads/*"

🔗 References

📤 Share & Export