First published: Sun Aug 16 2015(Updated: )
bootp in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to obtain potentially sensitive information about MAC addresses seen in previous Wi-Fi sessions by sniffing an 802.11 network for DNAv4 broadcast traffic.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=8.4 | |
macOS Yosemite | <=10.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3778 is considered a moderate severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2015-3778, users should update their Apple iOS to version 8.4.1 or later and Mac OS X to version 10.10.5 or later.
The impacts of CVE-2015-3778 include the risk of exposing MAC addresses from previous Wi-Fi sessions to remote attackers.
CVE-2015-3778 affects users of Apple iOS versions before 8.4.1 and Mac OS X versions before 10.10.5.
Yes, CVE-2015-3778 can be exploited remotely by attackers sniffing an 802.11 network for broadcast traffic.