First published: Tue Sep 19 2017(Updated: )
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "CFString" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
Credit: Australian Cyber Security Centre – Australian Signals Directorate Australian Cyber Security Centre – Australian Signals Directorate Australian Cyber Security Centre – Australian Signals Directorate Australian Cyber Security Centre – Australian Signals Directorate product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.13.0 | |
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan | ||
Apple watchOS | <4 | 4 |
Apple iOS | <11 | 11 |
Apple macOS High Sierra | <10.13 | 10.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2017-13821.
macOS High Sierra before version 10.13.1, Sierra, El Capitan, iOS before version 11, Mac OS X before version 10.13.1, and watchOS before version 4 are all affected.
The severity of CVE-2017-13821 is medium with a CVSS score of 5.5.
An attacker can exploit CVE-2017-13821 by bypassing intended memory-read restrictions via a crafted app.
Yes, Apple has released a fix for CVE-2017-13821. Users should update to macOS 10.13.1 or higher, iOS 11 or higher, or watchOS 4 or higher.