First published: Fri May 20 2016(Updated: )
MapKit in Apple iOS before 9.3.2, OS X before 10.11.5, and watchOS before 2.2.1 does not use HTTPS for shared links, which allows remote attackers to obtain sensitive information by sniffing the network for HTTP traffic.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=9.3.1 | |
Apple iOS and macOS | <=10.11.4 | |
Apple iOS, iPadOS, and watchOS | <=2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1842 has been rated as a high severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2016-1842, users should update their devices to the latest versions of iOS, macOS, and watchOS as provided by Apple.
CVE-2016-1842 affects iPhones running iOS before 9.3.2, Macs running OS X before 10.11.5, and watches running watchOS before 2.2.1.
CVE-2016-1842 can be exploited by remote attackers who want to sniff the network traffic to obtain sensitive information sent over unsecured HTTP.
Yes, it is important to take immediate action to update affected devices to mitigate the risks associated with CVE-2016-1842.