First published: Thu Sep 20 2012(Updated: )
Telephony in Apple iOS before 6 uses an SMS message's return address as the displayed sender address, which allows remote attackers to spoof text communication via a message in which the return address does not match the originating address.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=5.1.1 | |
iPhone OS | =1.0.0 | |
iPhone OS | =1.0.1 | |
iPhone OS | =1.0.2 | |
iPhone OS | =1.1.0 | |
iPhone OS | =1.1.1 | |
iPhone OS | =1.1.2 | |
iPhone OS | =1.1.3 | |
iPhone OS | =1.1.4 | |
iPhone OS | =1.1.5 | |
iPhone OS | =2.0 | |
iPhone OS | =2.0.0 | |
iPhone OS | =2.0.1 | |
iPhone OS | =2.0.2 | |
iPhone OS | =2.1 | |
iPhone OS | =2.1.1 | |
iPhone OS | =2.2 | |
iPhone OS | =2.2.1 | |
iPhone OS | =3.0 | |
iPhone OS | =3.0.1 | |
iPhone OS | =3.1 | |
iPhone OS | =3.1.2 | |
iPhone OS | =3.1.3 | |
iPhone OS | =3.2 | |
iPhone OS | =3.2.1 | |
iPhone OS | =3.2.2 | |
iPhone OS | =4.0 | |
iPhone OS | =4.0.1 | |
iPhone OS | =4.0.2 | |
iPhone OS | =4.1 | |
iPhone OS | =4.2.1 | |
iPhone OS | =4.2.5 | |
iPhone OS | =4.2.8 | |
iPhone OS | =4.3.0 | |
iPhone OS | =4.3.1 | |
iPhone OS | =4.3.2 | |
iPhone OS | =4.3.3 | |
iPhone OS | =4.3.5 | |
iPhone OS | =5.0 | |
iPhone OS | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3744 is categorized as a medium severity vulnerability due to its ability to enable SMS spoofing.
The best way to mitigate CVE-2012-3744 is to update your Apple iOS to version 6 or later.
CVE-2012-3744 affects Apple iOS versions prior to 6, including all versions from 1.0 to 5.1.1.
CVE-2012-3744 allows remote attackers to spoof SMS messages by manipulating the displayed sender address.
Devices running Apple iOS versions prior to 6, such as iPhones and iPads, are vulnerable to CVE-2012-3744.