Mac OS X Multiple EFI Vulnerabilities (EFI Security Update 2015-001)

High Nessus Plugin ID 84565


The remote host is affected by multiple vulnerabilities.


The remote Mac OS X host is running EFI firmware that is affected by multiple vulnerabilities :

- An insufficient locking issue exists, when resuming from sleep states, which allows a local attacker to write to the EFI flash memory by using an crafted application with root privileges. (CVE-2015-3692)

- A flaw exists due to lax restrictions on memory refresh rates, which allows a specially crafted process to corrupt the memory of some DDR3 SDRAM devices by inducing bit flips in page table entries (PTEs), also known as a 'row-hammer attack'. An attacker can exploit this to gain elevated privileges by manipulating the PTEs. (CVE-2015-3693)


Install Mac EFI Security Update 2015-001.

See Also

Plugin Details

Severity: High

ID: 84565

File Name: macosx_SecUpdEFI2015-001.nasl

Version: 1.7

Type: local

Agent: macosx

Published: 2015/07/07

Updated: 2019/11/22

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2015-3693

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/06/30

Vulnerability Publication Date: 2014/06/14

Reference Information

CVE: CVE-2015-3692, CVE-2015-3693

BID: 74971

APPLE-SA: APPLE-SA-2015-06-30-3