First published: Tue May 29 2018(Updated: )
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on Keychain state modifications.
Credit: Abraham Masri @cheesecakeufo product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS High Sierra | <10.13.5 | 10.13.5 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iTunes | <12.7.5 | 12.7.5 |
iStyle @cosme iPhone OS | <11.4 | |
Apple iOS and macOS | <10.13.5 | |
Apple iOS, iPadOS, and watchOS | <4.3.1 | |
Apple iCloud for Windows | <7.5 | |
Microsoft Windows | ||
Apple iTunes for Windows | <12.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4225 is a vulnerability that affects certain Apple products including iOS, macOS, iCloud, iTunes, and watchOS.
The severity of CVE-2018-4225 is medium, with a severity value of 5.5.
iOS before 11.4, macOS before 10.13.5, iCloud before 7.5 on Windows, iTunes before 12.7.5 on Windows, and watchOS before 4.3.1 are affected by CVE-2018-4225.
To fix CVE-2018-4225, update to the latest version of the affected Apple products: iOS 11.4 or later, macOS 10.13.5 or later, iCloud 7.5 or later on Windows, iTunes 12.7.5 or later on Windows, and watchOS 4.3.1 or later.
You can find more information about CVE-2018-4225 on the Apple support website at https://support.apple.com/en-us/HT208852 and on security advisory websites like SecurityFocus (http://www.securityfocus.com/bid/104889) and SecurityTracker (http://www.securitytracker.com/id/1041027).