First published: Tue Oct 31 2017(Updated: )
LinkPresentation. An inconsistent user interface issue was addressed with improved state management.
Credit: Rayyan Bijoora @Bijoora The City SchoolPAF Chapter product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS High Sierra | <10.13.1 | 10.13.1 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <11.3 | 11.3 |
Apple iOS, iPadOS, and watchOS | <12.1 | 12.1 |
Apple iOS, iPadOS, and watchOS | <4.3 | 4.3 |
iOS | <12.1 | |
Apple iOS and macOS | >=10.13<10.13.1 | |
Apple iOS, iPadOS, and watchOS | <4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4390 is a vulnerability in Apple iOS, macOS High Sierra, watchOS, and Sierra that allows attackers to perform UI spoofing by processing a specially crafted text message.
CVE-2018-4390 has a severity rating of 5.5 (medium).
To fix CVE-2018-4390, you should update your device to the latest available software version. For iOS, update to version 12.1 or later. For macOS High Sierra, update to version 10.13.1 or later. For watchOS, update to version 4.3 or later. For Sierra, apply Security Update 2017-001. For El Capitan, apply Security Update 2017-004.
You can find more information about CVE-2018-4390 on the Apple security advisory page: [link].