Description

Aquarius Desktop 3.0.069 for macOS contains an insecure file handling vulnerability in its support data archive generation feature. The application follows symbolic links placed inside the ~/Library/Logs/Aquarius directory and treats them as regular files. When building the support ZIP, Aquarius recursively enumerates logs using a JUCE directory iterator configured to follow symlinks, and later writes file data without validating whether the target is a symbolic link. A local attacker can exploit this behavior by planting symlinks to arbitrary filesystem locations, resulting in unauthorized disclosure or modification of arbitrary files. When chained with the associated HelperTool privilege escalation issue, root-owned files may also be exposed.

INFO

Published Date :

2025-12-03T00:00:00.000Z

Last Modified :

2025-12-03T17:04:48.932Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-65843 vulnerability.

Vendors Products
Acustica-audio
  • Aquarius
Acusticaudio
  • Aquarius Desktop
Apple
  • Macos
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-65843.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact