First published: Fri Oct 09 2015(Updated: )
The EFI component in Apple OS X before 10.11 allows physically proximate attackers to modify firmware during the EFI update process by inserting an Apple Ethernet Thunderbolt adapter with crafted code in an Option ROM, aka a "Thunderstrike" issue. NOTE: this issue exists because of an incomplete fix for CVE-2014-4498.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5914 has a medium severity level due to its ability to allow firmware modification through physical access.
To fix CVE-2015-5914, upgrade to a version of macOS later than 10.10.5 that addresses the vulnerability.
CVE-2015-5914 affects users of Apple OS X versions prior to 10.11, particularly those who could be targeted by physically proximate attackers.
CVE-2015-5914 is caused by an incomplete firmware update process that allows an attacker to insert crafted code via an Apple Ethernet Thunderbolt adapter.
No, CVE-2015-5914 requires physical access to the machine to exploit the vulnerability.