First published: Fri Sep 18 2015(Updated: )
The NSURL implementation in the CFNetwork SSL component in Apple iOS before 9 does not properly verify X.509 certificates from SSL servers after a certificate change, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | =1.0 | |
Apple iOS and macOS | <=10.10.5 | |
iStyle @cosme iPhone OS | <=8.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5824 is classified as a significant vulnerability due to its potential to allow man-in-the-middle attacks.
To fix CVE-2015-5824, update affected Apple devices to the latest version of their operating systems that are no longer impacted.
CVE-2015-5824 affects Apple iPhone OS versions up to 8.4.1, macOS Yosemite, and watchOS 1.0.
CVE-2015-5824 allows attackers to perform man-in-the-middle attacks by spoofing SSL servers.
CVE-2015-5824 involves the NSURL implementation in the CFNetwork SSL component.