Vulnerability Details : CVE-2014-8828
Sandbox in Apple OS X before 10.10 allows attackers to write to the sandbox-profile cache via a sandboxed app that includes a com.apple.sandbox segment in a path.
Exploit prediction scoring system (EPSS) score for CVE-2014-8828
Probability of exploitation activity in the next 30 days: 0.40%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 70 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-8828
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-8828
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8828
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/100522
Apple Mac OS X sandboxed process security bypass CVE-2014-8828 Vulnerability Report
-
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Apple - Lists.apple.comVendor Advisory
-
http://support.apple.com/HT204244
About the security content of OS X Yosemite v10.10.2 and Security Update 2015-001 - Apple SupportVendor Advisory
-
http://www.securitytracker.com/id/1031650
Apple OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges and Obtain Potentially Sensitive Information - SecurityTracker
Products affected by CVE-2014-8828
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*