First published: Fri Sep 18 2015(Updated: )
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Apple iOS before 9 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.10.5 | |
iStyle @cosme iPhone OS | <=8.4.1 | |
Apple iOS, iPadOS, and watchOS | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5869 is classified as a medium severity vulnerability due to its potential to allow remote attackers to modify hop-limit settings.
To mitigate CVE-2015-5869, users should update their affected Apple iOS, macOS, or watchOS versions to the latest available releases.
CVE-2015-5869 affects Apple iPhone OS versions up to 8.4.1, macOS Yosemite up to 10.10.5, and watchOS version 1.0.
CVE-2015-5869 can be exploited by attackers to send malicious Router Advertisement messages that change the hop-limit value.
CVE-2015-5869 was disclosed in September 2015 following security announcements from Apple.