First published: Thu Sep 19 2019(Updated: )
A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in macOS Catalina 10.15, watchOS 6, iOS 13, tvOS 13. A device may be passively tracked by its Wi-Fi MAC address.
Credit: Ta-Lun Yen UCCU HackerFuriousMacTeam the United States Naval Academythe Mitre Cooperation Ta-Lun Yen UCCU HackerFuriousMacTeam the United States Naval Academythe Mitre Cooperation Ta-Lun Yen UCCU HackerFuriousMacTeam the United States Naval Academythe Mitre Cooperation FuriousMacTeam the United States Naval Academythe Mitre Cooperation Ta-Lun Yen UCCU Hacker product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Catalina | <10.15 | 10.15 |
Apple iOS | <13 | 13 |
watchOS | <6 | 6 |
Apple iPhone OS | <13.2 | |
macOS Yosemite | <10.15 | |
tvOS | <13.2 | |
watchOS | <6.0 | |
tvOS | <13 | 13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2019-8854.
The severity of CVE-2019-8854 is high with a severity value of 7.5.
macOS Catalina 10.15, watchOS 6, iOS 13, and tvOS 13 are affected by CVE-2019-8854.
Yes, Apple has fixed CVE-2019-8854 in macOS Catalina 10.15, watchOS 6, iOS 13, and tvOS 13.
Devices can be passively tracked by their Wi-Fi MAC address, which is the vulnerability addressed by CVE-2019-8854.