First published: Fri Oct 23 2015(Updated: )
The X.509 certificate-trust implementation in Apple iOS before 9.1 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=9.0.2 | |
Apple iOS, iPadOS, and watchOS | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6997 has a medium severity rating due to its potential for man-in-the-middle attacks.
To fix CVE-2015-6997, update affected devices to iOS version 9.1 or later.
CVE-2015-6997 affects Apple iOS versions prior to 9.1.
CVE-2015-6997 makes devices vulnerable to man-in-the-middle attacks leveraging revoked certificates.
Yes, watchOS versions prior to 2.1 are also affected by CVE-2015-6997.