First published: Mon Jul 09 2018(Updated: )
In iOS before 11.4.1, watchOS before 4.3.2, tvOS before 11.4.1, Safari before 11.1.1, macOS High Sierra before 10.13.6, a spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
Credit: xisigr Tencent product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <11.4.1 | 11.4.1 |
macOS High Sierra | <10.13.6 | 10.13.6 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <4.3.2 | 4.3.2 |
Apple iOS and iPadOS | <11.4.1 | 11.4.1 |
Safari | <11.1.1 | |
iPhone OS | <11.4.1 | |
Apple iOS and macOS | <10.13.6 | |
tvOS | <11.4.1 | |
Apple iOS, iPadOS, and watchOS | <4.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4277 is a vulnerability in Apple software where a spoofing issue existed in the handling of URLs.
CVE-2018-4277 has a severity value of 7.5 (High).
iOS versions up to 11.4.1, watchOS versions up to 4.3.2, tvOS versions up to 11.4.1, Safari versions up to 11.1.1, macOS High Sierra versions up to 10.13.6 are affected by CVE-2018-4277.
To fix CVE-2018-4277, update to iOS 11.4.1 or later, watchOS 4.3.2 or later, tvOS 11.4.1 or later, Safari 11.1.1 or later, or macOS High Sierra 10.13.6 or later.
You can find more information about CVE-2018-4277 on the Apple support page: [link](https://support.apple.com/en-us/HT208936).