The kernel in Apple iOS before 8 and Apple TV before 7 uses a predictable random number generator during the early portion of the boot process, which allows attackers to bypass certain kernel-hardening protection mechanisms by using a user-space process to observe data related to the random numbers.
http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html
http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://support.apple.com/kb/HT6441
http://support.apple.com/kb/HT6442
http://www.securityfocus.com/bid/69882
http://www.securityfocus.com/bid/69911
http://www.securitytracker.com/id/1030866
Source: MITRE
Published: 2014-09-18
Updated: 2019-03-08
Type: CWE-310
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 8.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.2
Severity: HIGH