First published: Tue Jun 22 2010(Updated: )
Race condition in Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch allows physically proximate attackers to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=3.2 | |
iPhone OS | =1.0.0 | |
iPhone OS | =1.0.1 | |
iPhone OS | =1.0.2 | |
iPhone OS | =1.1 | |
iPhone OS | =1.1.0 | |
iPhone OS | =1.1.1 | |
iPhone OS | =1.1.2 | |
iPhone OS | =1.1.3 | |
iPhone OS | =1.1.4 | |
iPhone OS | =1.1.5 | |
iPhone OS | =2.0.0 | |
iPhone OS | =2.0.1 | |
iPhone OS | =2.0.2 | |
iPhone OS | =2.1.1 | |
iPhone OS | =2.2.1 | |
iPhone OS | =3.0 | |
iPhone OS | =3.0.1 | |
iPhone OS | =3.1.2 | |
iPhone OS | =3.1.3 | |
Apple iPod touch | ||
iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1775 is classified as a high severity vulnerability due to its potential to allow unauthorized data access.
To mitigate CVE-2010-1775, users should upgrade to iOS version 4.0 or later where the vulnerability is patched.
CVE-2010-1775 affects Apple iPhone and iPod touch devices running iOS versions before 4.0.
CVE-2010-1775 is a race condition vulnerability allowing attackers to bypass passcode requirements.
CVE-2010-1775 requires physical proximity to the device for exploitation, as it involves bypassing local passcode protection.