First published: Fri Mar 14 2014(Updated: )
Springboard in Apple iOS before 7.1 allows physically proximate attackers to bypass intended access restrictions and read the home screen by leveraging an application crash during activation of an unactivated device.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=7.0.6 | |
iPhone OS | =7.0 | |
iPhone OS | =7.0.1 | |
iPhone OS | =7.0.2 | |
iPhone OS | =7.0.3 | |
iPhone OS | =7.0.4 | |
iPhone OS | =7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1285 has a high severity rating, indicating a significant security risk.
To fix CVE-2014-1285, update your Apple iOS device to version 7.1 or later.
CVE-2014-1285 affects Apple iOS versions prior to 7.1, specifically versions 7.0 and 7.0.x.
CVE-2014-1285 enables physical attackers to bypass access restrictions and view the home screen of an unactivated device.
No, CVE-2014-1285 requires physical proximity to the device to be exploited.