First published: Wed Mar 11 2015(Updated: )
Secure Transport in Apple iOS before 8.2, Apple OS X through 10.10.2, and Apple TV before 7.1 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204 and CVE-2015-1637.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.10.2 | |
tvOS | <=7.0.3 | |
iOS | <=8.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1067 has a moderate severity rating due to its potential for cipher-downgrade attacks.
To mitigate CVE-2015-1067, ensure that your Apple devices are updated to the latest versions of iOS, OS X, or tvOS.
CVE-2015-1067 affects Apple iOS before 8.2, OS X through 10.10.2, and Apple TV before 7.1.
CVE-2015-1067 allows remote attackers to conduct cipher-downgrade attacks via crafted TLS traffic.
CVE-2015-1067 is related to the 'FREAK' vulnerability, which involves insecure TLS implementations.