First published: Sat Nov 16 2013(Updated: )
The App Store component in Apple iOS before 7.0.4 does not properly enforce an intended transaction-time password requirement, which allows local users to complete a (1) App purchase or (2) In-App purchase by leveraging previous entry of Apple ID credentials.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=7.0.3 | |
iPhone OS | =7.0 | |
iPhone OS | =7.0.1 | |
iPhone OS | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5193 is considered a high severity vulnerability due to its ability to bypass security mechanisms in Apple's App Store.
To mitigate CVE-2013-5193, users should update their iOS devices to version 7.0.4 or higher.
CVE-2013-5193 affects users of Apple iOS versions prior to 7.0.4, particularly those using older devices.
CVE-2013-5193 allows unauthorized completion of both App and In-App purchases without proper authentication.
There is no specific workaround for CVE-2013-5193 other than updating to the latest software version to secure the device.