First published: Mon Oct 28 2019(Updated: )
Wi-Fi. A logic issue existed in the handling of state transitions. This was addressed with improved state management.
Credit: Milos Cermak at ESET Milos Cermak at ESET Milos Cermak at ESET cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <13.2 | |
Apple iPhone OS | <13.2 | |
Apple Mac OS X | <10.15.1 | |
Apple macOS Catalina | ||
Apple High Sierra | ||
Broadcom Bcm43012 Firmware | ||
Apple High Sierra | ||
Apple iPadOS | ||
Apple High Sierra | ||
Broadcom Bcm4375 Firmware | ||
Apple iOS | ||
Apple High Sierra | ||
Apple High Sierra | ||
Broadcom Bcm4356 Firmware | ||
Apple High Sierra | ||
Apple macOS Catalina | <10.15.2 | 10.15.2 |
Apple Mojave | ||
Apple High Sierra | ||
Apple macOS Catalina | <10.15.1 | 10.15.1 |
Apple iOS | <13.2 | 13.2 |
Apple iPadOS | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this Wi-Fi vulnerability is CVE-2019-15126.
The affected software for this Wi-Fi vulnerability includes Apple macOS Catalina (up to version 10.15.2), Apple Mojave, and Apple High Sierra.
The severity of CVE-2019-15126 has not been provided.
To fix the Wi-Fi vulnerability, update your Apple macOS to the latest version as recommended by Apple.
You can find more information about CVE-2019-15126 on the Apple support website.