First published: Mon Mar 25 2019(Updated: )
A validation issue existed in Trust Anchor Management. This issue was addressed with improved validation. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An untrusted radius server certificate may be trusted.
Credit: an anonymous researcher QA team SecureW2an anonymous researcher QA team SecureW2an anonymous researcher QA team SecureW2an anonymous researcher QA team SecureW2 product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Mojave | <10.14.4 | 10.14.4 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.2 | 12.2 |
Apple iPhone OS | <12.2 | |
Apple Mac OS X | <10.14.4 | |
Apple watchOS | <5.2 | |
Apple iOS | <12.2 | 12.2 |
Apple watchOS | <5.2 | 5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-8531 is a validation issue that existed in Trust Anchor Management.
CVE-2019-8531 was addressed with improved validation in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, and iOS 12.2.
CVE-2019-8531 has a severity rating of 9.8 (critical).
Yes, a fix is available for CVE-2019-8531 in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, and iOS 12.2.
The affected software for CVE-2019-8531 includes iOS 12.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, watchOS 5.2, Apple iPhone OS, Apple Mac OS X, and Apple watchOS.