First published: Mon Feb 20 2017(Updated: )
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=10.1.1 | |
Apple iOS and macOS | <=10.12.1 | |
Apple iOS, iPadOS, and watchOS | <=2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7612 has been classified as a critical vulnerability due to its potential to allow arbitrary code execution in a privileged context.
To mitigate CVE-2016-7612, users should update their iOS to version 10.2, macOS to version 10.12.2, or watchOS to version 3.1.3 or later.
CVE-2016-7612 affects iOS versions prior to 10.2, macOS versions prior to 10.12.2, and watchOS versions prior to 3.1.3.
CVE-2016-7612 can facilitate attacks that allow attackers to execute arbitrary code or cause a denial of service.
While there are no confirmed public exploits for CVE-2016-7612, its critical nature indicates that it could be targeted by attackers.