Vulnerability Details : CVE-2016-7613
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages object-lifetime mishandling during process spawning.
Vulnerability category: Execute code
Products affected by CVE-2016-7613
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7613
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7613
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-7613
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7613
-
https://support.apple.com/HT207275
About the security content of macOS Sierra 10.12.1, Security Update 2016-002 El Capitan, and Security Update 2016-006 Yosemite - Apple SupportVendor Advisory
-
https://support.apple.com/HT207269
About the security content of watchOS 3.1 - Apple SupportVendor Advisory
-
https://support.apple.com/HT207270
About the security content of tvOS 10.0.1 - Apple SupportVendor Advisory
-
https://support.apple.com/HT207271
About the security content of iOS 10.1 - Apple SupportVendor Advisory
-
http://www.securityfocus.com/bid/94116
Apple iOS and macOS CVE-2016-7613 Local Code Execution VulnerabilityThird Party Advisory;VDB Entry
Jump to