CVE-2025-65841

6.2 MEDIUM
Published: December 03, 2025 Modified: December 18, 2025

Description

Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "encrypted" through predictable byte-substitution that can be trivially reversed, allowing immediate recovery of the plaintext value. Any attacker who can read this settings file can fully compromise the victim's Aquarius account by importing the stolen configuration into their own client or login through the vendor website. This results in complete account takeover, unauthorized access to cloud-synchronized data, and the ability to perform authenticated actions as the user.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://acustica.com
Source: cve@mitre.org
Not Applicable
http://aquarius.com
Source: cve@mitre.org
Broken Link
https://almightysec.com/account-takeover-via-weak-encryption/
Source: cve@mitre.org
Exploit Third Party Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.2 / 10.0
EPSS (Exploit Probability)
0.0%
15th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

acustica-audio