8.7
CWE
345
EPSS
0.043%
Advisory Published
Updated

CVE-2025-21606: Local Privilege Escalation via Exposed XPC Method Due to Client Verification Failure in stats

First published: Fri Jan 17 2025(Updated: )

stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user’s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Exelban Stats<2.11.21

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-21606?

    CVE-2025-21606 has been classified as a local privilege escalation vulnerability.

  • How do I fix CVE-2025-21606?

    To mitigate CVE-2025-21606, update to the latest version of Exelban Stats beyond 2.11.21.

  • What applications are affected by CVE-2025-21606?

    CVE-2025-21606 affects Exelban Stats versions up to and including 2.11.21.

  • What causes the vulnerability in CVE-2025-21606?

    The vulnerability in CVE-2025-21606 is caused by the insecure implementation of its XPC service.

  • Can CVE-2025-21606 be exploited remotely?

    CVE-2025-21606 is not a remote vulnerability; it requires local access for exploitation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203