First published: Mon Jul 09 2018(Updated: )
In iOS before 11.4.1, watchOS before 4.3.2, tvOS before 11.4.1, Safari before 11.1.1, macOS High Sierra before 10.13.6, a spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
Credit: xisigr Tencentxisigr Tencentxisigr Tencentxisigr Tencent product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <11.1.1 | |
Apple iPhone OS | <11.4.1 | |
Apple Mac OS X | <10.13.6 | |
Apple tvOS | <11.4.1 | |
Apple watchOS | <4.3.2 | |
Apple watchOS | <4.3.2 | 4.3.2 |
Apple iOS | <11.4.1 | 11.4.1 |
Apple tvOS | <11.4.1 | 11.4.1 |
Apple macOS High Sierra | <10.13.6 | 10.13.6 |
Apple Sierra | ||
Apple El Capitan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4277 is a vulnerability in Apple software where a spoofing issue existed in the handling of URLs.
CVE-2018-4277 has a severity value of 7.5 (High).
iOS versions up to 11.4.1, watchOS versions up to 4.3.2, tvOS versions up to 11.4.1, Safari versions up to 11.1.1, macOS High Sierra versions up to 10.13.6 are affected by CVE-2018-4277.
To fix CVE-2018-4277, update to iOS 11.4.1 or later, watchOS 4.3.2 or later, tvOS 11.4.1 or later, Safari 11.1.1 or later, or macOS High Sierra 10.13.6 or later.
You can find more information about CVE-2018-4277 on the Apple support page: [link](https://support.apple.com/en-us/HT208936).