CVE-2025-65843
📋 TL;DR
Aquarius Desktop 3.0.069 for macOS contains an insecure file handling vulnerability where the application follows symbolic links when creating support data archives. This allows local attackers to read or modify arbitrary files on the system, potentially including root-owned files when combined with a privilege escalation issue. Only macOS users running Aquarius Desktop 3.0.069 are affected.
💻 Affected Systems
- Aquarius Desktop
📦 What is this software?
Aquarius by Acustica Audio
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via unauthorized disclosure of sensitive files (including root-owned files when chained with privilege escalation) and potential arbitrary file modification leading to system instability or persistence.
Likely Case
Local attacker gains unauthorized access to user files, configuration files, or sensitive application data stored in accessible locations.
If Mitigated
Limited impact to non-sensitive files in user-accessible directories if proper file permissions are configured.
🎯 Exploit Status
Exploit requires local access to create symbolic links in ~/Library/Logs/Aquarius directory. Technical details are publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Check vendor website for security updates
2. If patch available, download and install updated version
3. Verify symlink following behavior is fixed
🔧 Temporary Workarounds
Remove write permissions from logs directory
allPrevents attackers from creating symbolic links in the vulnerable directory
chmod -R a-w ~/Library/Logs/Aquarius
Monitor and restrict symlink creation
allUse file integrity monitoring to detect symlink creation in vulnerable directory
🧯 If You Can't Patch
- Uninstall Aquarius Desktop 3.0.069 until patch is available
- Implement strict file permissions and monitor ~/Library/Logs/Aquarius directory for symlink creation
🔍 How to Verify
Check if Vulnerable:
Check if Aquarius Desktop version is 3.0.069 on macOS. Test by creating a symlink in ~/Library/Logs/Aquarius and checking if it's followed during support archive generation.
Check Version:
Check application About menu or package metadata
Verify Fix Applied:
After update, test that symlinks in ~/Library/Logs/Aquarius are no longer followed during support archive generation.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from Aquarius process
- Access to files outside expected log directories
Network Indicators:
- None - this is a local file system vulnerability
SIEM Query:
Process:aquarius AND (FileAccess:~/Library/Logs/Aquarius/* OR FileAccess:unexpected_paths)