U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-1078

Change History

New CVE Received from VulDB 2/06/2025 12:15:21 PM

Action Type Old Value New Value
Added Description

								
							
							
						
A vulnerability has been found in AppHouseKitchen AlDente Charge Limiter up to 1.29 on macOS and classified as critical. This vulnerability affects the function shouldAcceptNewConnection of the file com.apphousekitchen.aldente-pro.helper of the component XPC Service. The manipulation leads to improper authorization. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.30 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and acted very professional.
Added CVSS V4.0

								
							
							
						
AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Added CVSS V2

								
							
							
						
(AV:L/AC:L/Au:S/C:P/I:P/A:P)
Added CWE

								
							
							
						
CWE-266
Added CWE

								
							
							
						
CWE-285
Added Reference

								
							
							
						
https://vuldb.com/?ctiid.294844
Added Reference

								
							
							
						
https://vuldb.com/?id.294844
Added Reference

								
							
							
						
https://vuldb.com/?submit.492529
Added Reference

								
							
							
						
https://winslow1984.com/books/cve-collection/page/aldente-charge-limiter-130-unauthorized-privileged-hardware-operations