First published: Tue Nov 25 2008(Updated: )
Race condition in the Passcode Lock feature in Apple iPhone OS 2.0 through 2.1 and iPhone OS for iPod touch 2.0 through 2.1 allows physically proximate attackers to remove the lock and launch arbitrary applications by restoring the device from a backup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPod touch | ||
iPhone OS | ||
iPhone OS | =1.0 | |
iPhone OS | =1.0.1 | |
iPhone OS | =1.0.2 | |
iPhone OS | =1.1 | |
iPhone OS | =1.1.1 | |
iPhone OS | =1.1.2 | |
iPhone OS | =1.1.3 | |
iPhone OS | =1.1.4 | |
iPhone OS | =1.1.5 | |
iPhone OS | =2.0 | |
iPhone OS | =2.0.1 | |
iPhone OS | =2.0.2 | |
iPhone OS | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-4229 is considered high due to the potential for unauthorized access and control of iPhone and iPod touch devices.
To fix CVE-2008-4229, update your device to the latest version of iPhone OS that is not vulnerable to this issue.
CVE-2008-4229 affects Apple iPhone OS versions 2.0 through 2.1 and the iPod touch versions 2.0 through 2.1.
CVE-2008-4229 exploits a race condition in the Passcode Lock feature, allowing attackers to bypass security.
Yes, CVE-2008-4229 requires physical access to the device to be exploited.