First published: Mon Feb 20 2017(Updated: )
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages object-lifetime mishandling during process spawning.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=10.0.3 | |
Apple iOS and macOS | <=10.12.0 | |
Apple Mobile Safari | <=10.0.0 | |
Apple iOS, iPadOS, and watchOS | <=2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7613 has been rated as a critical vulnerability due to its potential to allow arbitrary code execution in privileged contexts.
To mitigate CVE-2016-7613, update your affected Apple devices to the latest versions of iOS, macOS, tvOS, or watchOS.
CVE-2016-7613 affects devices running iOS before 10.1, macOS before 10.12.1, tvOS before 10.0.1, and watchOS before 3.1.
CVE-2016-7613 is a kernel vulnerability that can be exploited to execute arbitrary code in a privileged context.
Yes, CVE-2016-7613 can potentially be exploited remotely if the device is targeted by an attacker.