First published: Sat Dec 02 2017(Updated: )
An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
Credit: Ian Beer Google Project ZeroBrandon Azad Jann Horn Google Project ZeroIan Beer Google Project ZeroBrandon Azad Jann Horn Google Project ZeroBrandon Azad Jann Horn Google Project ZeroIan Beer Google Project ZeroBrandon Azad Jann Horn Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <11.2 | |
Apple Mac OS X | <10.13.2 | |
Apple tvOS | <11.2 | |
Apple watchOS | <4.2 | |
Apple iOS | <11.2 | 11.2 |
Apple macOS High Sierra | <10.13.2 | 10.13.2 |
Apple Sierra | ||
Apple El Capitan | ||
Apple watchOS | <4.2 | 4.2 |
Apple tvOS | <11.2 | 11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2017-13869.
iOS before 11.2, macOS before 10.13.2, tvOS before 11.2, and watchOS before 4.2 are affected by this vulnerability.
The severity of CVE-2017-13869 is medium with a severity value of 5.5.
Attackers can exploit this vulnerability by bypassing intended memory-read restrictions via a crafted app.
Yes, updating to the latest versions of iOS, macOS, tvOS, and watchOS will fix this vulnerability.