First published: Fri Oct 09 2015(Updated: )
AirScan in Apple OS X before 10.11 allows man-in-the-middle attackers to obtain eSCL packet payload data via unspecified vectors.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5853 has a medium severity rating due to its potential for man-in-the-middle attacks.
To fix CVE-2015-5853, update to macOS 10.11 or later, which addresses this vulnerability.
CVE-2015-5853 affects Apple OS X versions prior to 10.11, specifically OS X Yosemite and earlier.
CVE-2015-5853 allows man-in-the-middle attackers to access eSCL packet payload data.
Yes, if you are using an affected version of Apple OS X before 10.11, your device is at risk for eSCL data exposure.