Vulnerability Description
Aquarius Desktop 3.0.069 for macOS contains an insecure file handling vulnerability in its support data archive generation feature. The application follows symbolic links placed inside the ~/Library/Logs/Aquarius directory and treats them as regular files. When building the support ZIP, Aquarius recursively enumerates logs using a JUCE directory iterator configured to follow symlinks, and later writes file data without validating whether the target is a symbolic link. A local attacker can exploit this behavior by planting symlinks to arbitrary filesystem locations, resulting in unauthorized disclosure or modification of arbitrary files. When chained with the associated HelperTool privilege escalation issue, root-owned files may also be exposed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Acustica-Audio | Aquarius | 3.0.069 |
Related Weaknesses (CWE)
References
- https://almightysec.com/insecure-file-handling-via-symlink/ExploitThird Party Advisory
FAQ
What is CVE-2025-65843?
CVE-2025-65843 is a vulnerability with a CVSS score of 7.7 (HIGH). Aquarius Desktop 3.0.069 for macOS contains an insecure file handling vulnerability in its support data archive generation feature. The application follows symbolic links placed inside the ~/Library/L...
How severe is CVE-2025-65843?
CVE-2025-65843 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65843?
Check the references section above for vendor advisories and patch information. Affected products include: Acustica-Audio Aquarius.