Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "encrypted" through predictable byte-substitution that can be trivially reversed, allowing immediate recovery of the plaintext value. Any attacker who can read this settings file can fully compromise the victim's Aquarius account by importing the stolen configuration into their own client or login through the vendor website. This results in complete account takeover, unauthorized access to cloud-synchronized data, and the ability to perform authenticated actions as the user.
Metrics
Affected Vendors & Products
References
History
Fri, 05 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Acusticaudio
Acusticaudio aquarius Desktop Apple Apple macos |
|
| Vendors & Products |
Acusticaudio
Acusticaudio aquarius Desktop Apple Apple macos |
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Aquarius Desktop 3.0.069 for macOS stores user authentication credentials in the local file ~/Library/Application Support/Aquarius/aquarius.settings using a weak obfuscation scheme. The password is "encrypted" through predictable byte-substitution that can be trivially reversed, allowing immediate recovery of the plaintext value. Any attacker who can read this settings file can fully compromise the victim's Aquarius account by importing the stolen configuration into their own client or login through the vendor website. This results in complete account takeover, unauthorized access to cloud-synchronized data, and the ability to perform authenticated actions as the user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-03T00:00:00.000Z
Updated: 2025-12-05T19:03:51.235Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65841
Updated: 2025-12-05T19:03:46.690Z
Status : Awaiting Analysis
Published: 2025-12-03T17:15:54.170
Modified: 2025-12-05T19:15:48.827
Link: CVE-2025-65841
No data.