# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-22652 |
668 |
|
|
2022-03-18 |
2022-03-26 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
The GSMA authentication panel could be presented on the lock screen. The issue was resolved by requiring device unlock to interact with the GSMA authentication panel. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access may be able to view and modify the carrier account information and settings from the lock screen. |
2 |
CVE-2022-21658 |
363 |
|
|
2022-01-20 |
2022-10-19 |
3.3 |
None |
Local |
Medium |
Not required |
None |
Partial |
Partial |
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions. |
3 |
CVE-2021-30866 |
|
|
|
2021-08-24 |
2023-01-09 |
3.3 |
None |
Local Network |
Low |
Not required |
Partial |
None |
None |
A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. A device may be passively tracked by its WiFi MAC address. |
4 |
CVE-2020-6616 |
|
|
|
2020-05-08 |
2023-01-09 |
3.3 |
None |
Local Network |
Low |
Not required |
None |
Partial |
None |
Some Broadcom chips mishandle Bluetooth random-number generation because a low-entropy Pseudo Random Number Generator (PRNG) is used in situations where a Hardware Random Number Generator (HRNG) should have been used to prevent spoofing. This affects, for example, Samsung Galaxy S8, S8+, and Note8 devices with the BCM4361 chipset. The Samsung ID is SVE-2020-16882 (May 2020). |
5 |
CVE-2019-8906 |
125 |
|
|
2019-02-18 |
2021-12-09 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
None |
Partial |
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused. |
6 |
CVE-2018-4428 |
|
|
|
2020-10-27 |
2020-10-30 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 12.1.1. A local attacker may be able to share items from the lock screen. |
7 |
CVE-2018-4305 |
20 |
|
|
2019-04-03 |
2019-04-04 |
3.3 |
None |
Local Network |
Low |
Not required |
None |
Partial |
None |
An input validation issue was addressed with improved input validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5. |
8 |
CVE-2017-7066 |
119 |
|
DoS Overflow Mem. Corr. |
2018-04-03 |
2019-03-08 |
3.3 |
None |
Local Network |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. tvOS before 10.2.2 is affected. The issue involves the "Wi-Fi" component. It allows attackers to cause a denial of service (memory corruption on the Wi-Fi chip) by leveraging proximity for 802.11. |
9 |
CVE-2016-4686 |
264 |
|
|
2017-02-20 |
2017-07-29 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "Contacts" component, which does not prevent an app's Address Book access after access revocation. |
10 |
CVE-2016-4635 |
200 |
|
+Info |
2016-07-22 |
2017-09-01 |
3.5 |
None |
Remote |
Medium |
??? |
Partial |
None |
None |
FaceTime in Apple iOS before 9.3.3 and OS X before 10.11.6 allows man-in-the-middle attackers to spoof relayed-call termination, and obtain sensitive audio information in opportunistic circumstances, via unspecified vectors. |
11 |
CVE-2016-1763 |
20 |
|
+Info |
2016-03-24 |
2016-12-03 |
3.5 |
None |
Remote |
Medium |
??? |
Partial |
None |
None |
Messages in Apple iOS before 9.3 does not ensure that an auto-fill action applies to the intended message thread, which allows remote authenticated users to obtain sensitive information by providing a crafted sms: URL and reading a thread. |
12 |
CVE-2015-5869 |
20 |
|
|
2015-09-18 |
2016-12-22 |
3.3 |
None |
Local Network |
Low |
Not required |
None |
Partial |
None |
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Apple iOS before 9 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message. |
13 |
CVE-2015-3778 |
200 |
|
+Info |
2015-08-16 |
2016-12-24 |
3.3 |
None |
Local Network |
Low |
Not required |
Partial |
None |
None |
bootp in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to obtain potentially sensitive information about MAC addresses seen in previous Wi-Fi sessions by sniffing an 802.11 network for DNAv4 broadcast traffic. |
14 |
CVE-2014-4372 |
59 |
|
|
2014-09-18 |
2019-03-08 |
3.6 |
None |
Local |
Low |
Not required |
None |
Partial |
Partial |
syslogd in the syslog subsystem in Apple iOS before 8 and Apple TV before 7 allows local users to change the permissions of arbitrary files via a symlink attack on an unspecified file. |
15 |
CVE-2014-1353 |
264 |
|
Bypass |
2014-07-01 |
2017-01-07 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
Lock Screen in Apple iOS before 7.1.2 does not properly manage the telephony state in Airplane Mode, which allows physically proximate attackers to bypass the lock protection mechanism, and access a certain foreground application, via unspecified vectors. |
16 |
CVE-2014-1351 |
264 |
|
Bypass |
2014-07-01 |
2017-01-07 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
Siri in Apple iOS before 7.1.2 allows physically proximate attackers to bypass an intended lock-screen passcode requirement, and read a contact list, via a Siri request that refers to a contact ambiguously. |
17 |
CVE-2013-5164 |
362 |
|
Bypass |
2013-10-24 |
2013-10-24 |
3.3 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
None |
Multiple race conditions in the Phone app in Apple iOS before 7.0.3 allow physically proximate attackers to bypass the locked state, and dial the telephone numbers in arbitrary Contacts entries, by visiting the Contacts pane. |
18 |
CVE-2013-5160 |
264 |
|
Bypass |
2013-09-28 |
2013-10-07 |
3.3 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
None |
Passcode Lock in Apple iOS before 7.0.2 on iPhone devices allows physically proximate attackers to bypass an intended passcode requirement, and dial arbitrary telephone numbers, by making a series of taps of the emergency-call button to trigger a NULL pointer dereference. |
19 |
CVE-2013-5147 |
362 |
|
Bypass |
2013-09-19 |
2013-09-27 |
3.7 |
None |
Local |
High |
Not required |
Partial |
Partial |
Partial |
Passcode Lock in Apple iOS before 7 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging a race condition involving phone calls and ejection of a SIM card. |
20 |
CVE-2013-5144 |
264 |
|
Bypass |
2013-10-24 |
2013-10-24 |
3.3 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
None |
Passcode Lock in Apple iOS before 7.0.3 on iPhone devices allows physically proximate attackers to bypass an intended passcode requirement, and dial arbitrary telephone numbers, by tapping the emergency-call button during a certain notification and camera-pane state to trigger a NULL pointer dereference. |
21 |
CVE-2013-0964 |
20 |
|
Bypass |
2013-01-29 |
2019-03-08 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
The kernel in Apple iOS before 6.1 and Apple TV before 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a length of less than one page. |
22 |
CVE-2012-3750 |
264 |
|
Bypass |
2012-11-03 |
2017-08-29 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors. |
23 |
CVE-2012-3738 |
264 |
|
Bypass +Info |
2012-09-20 |
2013-03-26 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions. |
24 |
CVE-2012-3725 |
200 |
|
+Info |
2012-09-20 |
2017-08-29 |
3.3 |
None |
Local Network |
Low |
Not required |
Partial |
None |
None |
The DNAv4 protocol implementation in the DHCP component in Apple iOS before 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote attackers to obtain sensitive information about previous device locations by sniffing an unencrypted Wi-Fi network for these packets. |