First published: Fri Sep 18 2015(Updated: )
The CFNetwork HTTPProtocol component in Apple iOS before 9 allows remote attackers to bypass the HSTS protection mechanism, and consequently obtain sensitive information, via a crafted URL.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=8.4.1 | |
Apple iOS, iPadOS, and watchOS | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5858 has been classified as a medium severity vulnerability.
To mitigate CVE-2015-5858, users should update their Apple devices to iOS version 9 or later.
CVE-2015-5858 allows remote attackers to bypass HSTS protection, potentially exposing sensitive information.
CVE-2015-5858 affects Apple iOS devices before version 9 and Apple watchOS version 1.0.
The main risk of CVE-2015-5858 is the exposure of sensitive information due to improper URL handling.