First published: Thu Mar 29 2018(Updated: )
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. The issue involves the "WindowServer" component. It allows attackers to bypass the Secure Input Mode protection mechanism, and log keystrokes of arbitrary apps, via a crafted app that scans key states.
Credit: Andreas Hegenberg folivora product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS High Sierra | <10.13.4 | 10.13.4 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <11.3 | 11.3 |
iOS | <11.3 | |
Apple iOS and macOS | <10.13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4131 is a vulnerability that allows attackers to log keystrokes entered into arbitrary apps on certain Apple products.
iOS before 11.3 and macOS before 10.13.4 are affected.
CVE-2018-4131 has a severity rating of 7.8 (high).
To fix CVE-2018-4131, update your iOS device to version 11.3 or higher and update macOS to version 10.13.4 or higher.
You can find more information about CVE-2018-4131 at the following references: [http://www.securityfocus.com/bid/103581](http://www.securityfocus.com/bid/103581), [http://www.securitytracker.com/id/1040604](http://www.securitytracker.com/id/1040604), [http://www.securitytracker.com/id/1040608](http://www.securitytracker.com/id/1040608)