First published: Fri Dec 11 2015(Updated: )
dyld in Apple iOS before 9.2, tvOS before 9.1, and watchOS before 2.1 mishandles segment validation, which allows attackers to execute arbitrary code in a privileged context via a crafted app.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=9.1 | |
watchOS | <=2.0 | |
tvOS | <=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7072 is considered a high severity vulnerability due to its potential to allow execution of arbitrary code in a privileged context.
To fix CVE-2015-7072, update your device to iOS version 9.2 or later, tvOS version 9.1 or later, or watchOS version 2.1 or later.
CVE-2015-7072 affects iOS versions prior to 9.2, tvOS versions prior to 9.1, and watchOS versions prior to 2.1.
CVE-2015-7072 requires a crafted app to be installed on the device, meaning exploitation cannot occur remotely without user interaction.
Exploitation of CVE-2015-7072 could allow an attacker to execute arbitrary code with elevated privileges, compromising device security.