First published: Thu Sep 18 2014(Updated: )
The 802.1X subsystem in Apple iOS before 8 and Apple TV before 7 does not require strong authentication methods, which allows remote attackers to calculate credentials by offering LEAP authentication from a crafted Wi-Fi AP and then performing a cryptographic attack against the MS-CHAPv1 hash.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=7.1.2 | |
iStyle @cosme iPhone OS | =7.0 | |
iStyle @cosme iPhone OS | =7.0.1 | |
iStyle @cosme iPhone OS | =7.0.2 | |
iStyle @cosme iPhone OS | =7.0.3 | |
iStyle @cosme iPhone OS | =7.0.4 | |
iStyle @cosme iPhone OS | =7.0.5 | |
iStyle @cosme iPhone OS | =7.0.6 | |
iStyle @cosme iPhone OS | =7.1 | |
iStyle @cosme iPhone OS | =7.1.1 | |
tvOS | <=6.2 | |
tvOS | =6.0 | |
tvOS | =6.0.1 | |
tvOS | =6.0.2 | |
tvOS | =6.1 | |
tvOS | =6.1.1 | |
tvOS | =6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4364 is classified as a high severity vulnerability due to the potential for remote credential theft.
To address CVE-2014-4364, it is recommended to upgrade to Apple iOS version 8 or later.
CVE-2014-4364 affects Apple iOS versions prior to 8 and Apple TV versions prior to 7.
CVE-2014-4364 allows remote attackers to exploit weakened authentication methods to calculate user credentials.
There are no specific workarounds for CVE-2014-4364, so users should upgrade their devices to mitigate risk.