First published: Tue May 29 2018(Updated: )
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on Keychain state modifications.
Credit: Abraham Masri @cheesecakeufo Abraham Masri @cheesecakeufo product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.7.5 | 12.7.5 |
Apple macOS High Sierra | <10.13.5 | 10.13.5 |
Apple Sierra | ||
Apple El Capitan | ||
Apple iPhone OS | <11.4 | |
Apple Mac OS X | <10.13.5 | |
Apple watchOS | <4.3.1 | |
Apple iCloud | <7.5 | |
Microsoft Windows | ||
Apple iTunes | <12.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4225 is a vulnerability that affects certain Apple products including iOS, macOS, iCloud, iTunes, and watchOS.
The severity of CVE-2018-4225 is medium, with a severity value of 5.5.
iOS before 11.4, macOS before 10.13.5, iCloud before 7.5 on Windows, iTunes before 12.7.5 on Windows, and watchOS before 4.3.1 are affected by CVE-2018-4225.
To fix CVE-2018-4225, update to the latest version of the affected Apple products: iOS 11.4 or later, macOS 10.13.5 or later, iCloud 7.5 or later on Windows, iTunes 12.7.5 or later on Windows, and watchOS 4.3.1 or later.
You can find more information about CVE-2018-4225 on the Apple support website at https://support.apple.com/en-us/HT208852 and on security advisory websites like SecurityFocus (http://www.securityfocus.com/bid/104889) and SecurityTracker (http://www.securitytracker.com/id/1041027).