First published: Mon Mar 27 2017(Updated: )
Keychain. In certain circumstances, iCloud Keychain failed to validate the authenticity of OTR packets. This issue was addressed through improved validation.
Credit: Alex Radocea Longterm Security Inc product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | <10.3 | 10.3 |
iOS | <=10.2.1 | |
Apple iOS and macOS | <=10.12.3 | |
tvOS | <=10.1.1 | |
Apple iOS, iPadOS, and watchOS | <=3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-2448 has been classified as a high severity vulnerability affecting keychain authentication in certain Apple products.
To remediate CVE-2017-2448, users should update their devices to iOS version 10.3, macOS version 10.12.4, tvOS version 10.2, or the latest available version.
CVE-2017-2448 affects iOS devices prior to version 10.3, macOS systems prior to 10.12.4, tvOS devices prior to version 10.2, and watchOS devices prior to version 3.2.
CVE-2017-2448 is a cryptographic vulnerability related to improper validation of OTR packet authenticity in Apple's keychain.
CVE-2017-2448 was publicly disclosed in March 2017 as part of Apple's security updates.