First published: Tue Sep 19 2017(Updated: )
Kernel. A validation issue was addressed with improved input sanitization.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle LtdThe UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <11 | 11 |
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan | ||
Apple Mac OS X | <=10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-13818 is a vulnerability in the Kernel component of certain Apple products that allows attackers to bypass memory-read restrictions.
macOS versions before 10.13.1, macOS High Sierra versions up to 10.13, Sierra, El Capitan, tvOS versions up to 11, iOS versions up to 11, and watchOS versions up to 4 are affected by CVE-2017-13818.
CVE-2017-13818 has a severity rating of medium with a severity value of 5.5.
Update your Apple products to macOS 10.13.1 or later, or install the latest security updates provided by Apple for your specific product.
You can find more information about CVE-2017-13818 on the official Apple support website at the following URLs: [Reference 1](https://support.apple.com/en-us/HT208115), [Reference 2](https://support.apple.com/en-us/HT208221), [Reference 3](https://support.apple.com/en-us/HT208113).