Vulnerability Description
Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "encrypted" through predictable byte-substitution that can be trivially reversed, allowing immediate recovery of the plaintext value. Any attacker who can read this settings file can fully compromise the victim's Aquarius account by importing the stolen configuration into their own client or login through the vendor website. This results in complete account takeover, unauthorized access to cloud-synchronized data, and the ability to perform authenticated actions as the user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Acustica-Audio | Aquarius | 3.0.069 |
Related Weaknesses (CWE)
References
- http://acustica.comNot Applicable
- http://aquarius.comBroken Link
- https://almightysec.com/account-takeover-via-weak-encryption/ExploitThird Party Advisory
FAQ
What is CVE-2025-65841?
CVE-2025-65841 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "e...
How severe is CVE-2025-65841?
CVE-2025-65841 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65841?
Check the references section above for vendor advisories and patch information. Affected products include: Acustica-Audio Aquarius.