{"vulnerability": "GHSA-qwhf-px96-7f6v", "sightings": [{"uuid": "121f2872-3c7e-429d-a7c3-6235c0c12c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-QWHF-PX96-7F6V", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2213", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21606\n\ud83d\udd39 Description: stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user\u2019s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-17T20:10:05.277Z\n\ud83d\udccf Modified: 2025-01-17T20:10:05.277Z\n\ud83d\udd17 References:\n1. https://github.com/exelban/stats/security/advisories/GHSA-qwhf-px96-7f6v\n2. https://github.com/exelban/stats/commit/c10759f7a186efdd82ddd818dae2ac1f853691fc", "creation_timestamp": "2025-01-17T20:58:02.000000Z"}, {"uuid": "4e202b76-3ada-4122-9f07-339602b52475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-qwhf-px96-7f6v", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845537604687570", "content": "", "creation_timestamp": "2025-01-17T20:17:24.687491Z"}, {"uuid": "725fd574-f4aa-41b9-a68b-aa64fb77c439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-qwhf-px96-7f6v", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113845552224560073", "content": "", "creation_timestamp": "2025-01-17T20:21:07.668278Z"}]}