First published: Sun Sep 25 2016(Updated: )
WKWebView in WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Safari before 10 does not properly verify X.509 certificates from HTTPS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <=12.4.3 | |
Microsoft Windows | ||
Apple Mobile Safari | <=9.1.3 | |
iStyle @cosme iPhone OS | <=9.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4763 has been classified as a medium severity vulnerability due to its potential risk of man-in-the-middle attacks.
To mitigate CVE-2016-4763, update affected software to the latest versions which address the certificate validation issue.
CVE-2016-4763 affects iOS versions prior to 10, specifically up to version 9.3.5.
Yes, CVE-2016-4763 can be exploited remotely by attackers through crafted HTTPS certificates.
CVE-2016-4763 impacts Apple devices running outdated versions of iOS and Safari.