First published: Sun Aug 16 2015(Updated: )
WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not enforce the HTTP Strict Transport Security (HSTS) protection mechanism for Content Security Policy (CSP) report requests, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or spoof a report by modifying the client-server data stream.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=8.4 | |
Apple Mobile Safari | >=6.0<6.2.8 | |
Apple Mobile Safari | >=7.0<7.1.8 | |
Apple Mobile Safari | >=8.0<8.0.8 | |
iStyle @cosme iPhone OS | <8.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3750 has a medium severity rating, as it allows possible man-in-the-middle attacks due to insufficient enforcement of HSTS for CSP report requests.
To mitigate CVE-2015-3750, users should update their Apple Safari browser and iOS to the latest versions that incorporate the security patch.
CVE-2015-3750 affects Safari versions prior to 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8.
CVE-2015-3750 impacts iOS versions before 8.4.1.
The impact of CVE-2015-3750 can allow attackers to intercept and manipulate CSP report requests, potentially leading to security breaches.