First published: Fri Sep 18 2015(Updated: )
The convenience initializer in the Multipeer Connectivity component in Apple iOS before 9 does not require an encrypted session, which allows local users to obtain cleartext multipeer data via an encrypted-to-unencrypted downgrade attack.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.10.5 | |
Apple iPhone OS | <=8.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5851 has been classified as a medium severity vulnerability.
To mitigate CVE-2015-5851, upgrade to a version of iOS or macOS that is 9.0 or later.
CVE-2015-5851 exploits the lack of encryption requirement in the Multipeer Connectivity component.
Users of iOS versions prior to 9.0 and macOS versions up to 10.10.5 are affected by CVE-2015-5851.
An encrypted-to-unencrypted downgrade attack allows local users to access cleartext multipeer data due to the vulnerability in session encryption.