Vulnerability Details : CVE-2014-4427
App Sandbox in Apple OS X before 10.10 allows attackers to bypass a sandbox protection mechanism via the accessibility API.
Products affected by CVE-2014-4427
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-4427
0.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-4427
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-4427
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-4427
-
http://www.securitytracker.com/id/1031063
Apple OS X Multiple Flaws Let Users Execute Arbitrary Code, Obtain Elevated Privileges, Bypass Security Restrictions, and Obtain Potentially Sensitive Information - SecurityTracker
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/97642
Apple Mac OS X accessibility API security bypass CVE-2014-4427 Vulnerability Report
-
http://www.securityfocus.com/bid/70635
Apple Mac OS X CVE-2014-4427 Accessibility API Security Bypass Vulnerability
-
https://support.apple.com/kb/HT6535
About the security content of OS X Yosemite v10.10 - Apple SupportVendor Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
Jump to