First published: Mon Feb 20 2017(Updated: )
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "syslog" component. It allows local users to gain privileges via unspecified vectors related to Mach port name references.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=10.1.1 | |
Apple iOS and macOS | <=10.12.1 | |
Apple iOS, iPadOS, and watchOS | <=2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7660 is considered to have a high severity as it allows local users to gain root privileges on affected Apple devices.
To fix CVE-2016-7660, update your iOS to 10.2 or later, macOS to 10.12.2 or later, and watchOS to 3.1.3 or later.
CVE-2016-7660 affects iOS versions prior to 10.2, macOS versions before 10.12.2, and watchOS versions below 3.1.3.
The vulnerability involves the syslog component which is affected by the Mach port name references issue.
Yes, local users can potentially exploit CVE-2016-7660 to gain elevated privileges through specific vectors.