CVE-2025-65841

Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "encrypted" through predictable byte-substitution that can be trivially reversed, allowing immediate recovery of the plaintext value. Any attacker who can read this settings file can fully compromise the victim's Aquarius account by importing the stolen configuration into their own client or login through the vendor website. This results in complete account takeover, unauthorized access to cloud-synchronized data, and the ability to perform authenticated actions as the user.
References
Link Resource
http://acustica.com Not Applicable
http://aquarius.com Broken Link
https://almightysec.com/account-takeover-via-weak-encryption/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:acustica-audio:aquarius:3.0.069:*:*:*:*:macos:*:*

History

No history.

Information

Published : 2025-12-03 17:15

Updated : 2025-12-18 20:52


NVD link : CVE-2025-65841

Mitre link : CVE-2025-65841

CVE.ORG link : CVE-2025-65841


JSON object : View

Products Affected

acustica-audio

  • aquarius
CWE
CWE-284

Improper Access Control