First published: Thu Sep 18 2014(Updated: )
The Accounts subsystem in Apple iOS before 8 allows attackers to bypass a sandbox protection mechanism and obtain an active iCloud account's Apple ID and metadata via a crafted application.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=7.1.2 | |
iPhone OS | =7.0 | |
iPhone OS | =7.0.1 | |
iPhone OS | =7.0.2 | |
iPhone OS | =7.0.3 | |
iPhone OS | =7.0.4 | |
iPhone OS | =7.0.5 | |
iPhone OS | =7.0.6 | |
iPhone OS | =7.1 | |
iPhone OS | =7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4423 has a medium severity rating due to the potential for attackers to access sensitive iCloud account information.
To fix CVE-2014-4423, you should update your Apple iPhone OS to version 8.0 or later.
CVE-2014-4423 affects Apple iOS versions prior to 8.0, including all versions from 7.0 to 7.1.2.
CVE-2014-4423 allows attackers to bypass sandbox restrictions and obtain access to an active iCloud account's Apple ID and metadata.
Yes, if your device runs any version of iOS 7.x, it is at risk due to the vulnerability outlined in CVE-2014-4423.