First published: Fri Jul 03 2015(Updated: )
Apple Mac EFI before 2015-001, as used in OS X before 10.10.4 and other products, does not enforce a locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging root privileges.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3692 is considered a high severity vulnerability due to its potential for local exploitation via EFI flash attacks.
To fix CVE-2015-3692, update to OS X version 10.10.4 or later, which addresses the vulnerability.
CVE-2015-3692 primarily affects local users on Apple Mac systems running OS X before version 10.10.4.
CVE-2015-3692 enables local users to conduct EFI flash attacks by leveraging root privileges.
Exploitation of CVE-2015-3692 can lead to unauthorized modifications of the system firmware, posing serious security risks.