Apple iOS < 10 Multiple Vulnerabilities (BlueBorne)

high Nessus Plugin ID 93515

Synopsis

The version of iOS running on the mobile device is affected by multiple vulnerabilities.

Description

The version of iOS running on the mobile device is prior to 10. It is, therefore, affected by multiple vulnerabilities :

- An access control issue exists in the Sandbox Profiles component in SMS draft directories that allows a local attacker to determine who a user is texting by using the 'stat' command on a directory. (CVE-2016-4620)

- An unspecified permissions issue exists in PlaceData in the GeoServices component that allows a local attacker, via a crafted application, to disclose sensitive information. (CVE-2016-4719)

- A flaw exists in the Messages component in the Handoff for Messages functionality due to incorrectly exposing messages even while signed out. A physically present attacker can exploit this to disclose sensitive information. (CVE-2016-4740)

- A flaw exists in the Assets component due to updates being sent over unencrypted channels. A man-in-the-middle attacker can exploit this to block a device from receiving software updates. (CVE-2016-4741)

- A flaw exists in the Keyboards component due to the Keyboard Autocorrect Suggestion feature inadvertently caching sensitive information. A physically present attacker can exploit this to disclose sensitive information. (CVE-2016-4746)

- A flaw exists in the Mail component due to improper handling of untrusted certificates. A man-in-the-middle attacker can exploit this to disclose credential information. (CVE-2016-4747)

- A flaw exists in the Printing UIKit component when writing an unencrypted document to a temporary file when using AirPrint preview. A local attacker can exploit this to disclose sensitive information. (CVE-2016-4749)

- A flaw exists in the Springboard component due to cached application snapshots being displayed in the task switcher. A local attacker can exploit this to disclose sensitive information. (CVE-2016-7759)

- A flaw exists related to the BlueTooth subsystem that could allow remote code execution as well as man-in-the-middle attacks. This issue is also known as 'BlueBorne'.

Solution

Upgrade to Apple iOS version 10.0 or later.

See Also

https://support.apple.com/en-us/HT207143

http://www.nessus.org/u?02739536

https://www.armis.com/blueborne/

Plugin Details

Severity: High

ID: 93515

File Name: apple_ios_100_check.nbin

Version: 1.82

Type: local

Published: 9/15/2016

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.9

Temporal Score: 5.8

Vector: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-14315

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:iphone_os

Required KB Items: mdm/dependency/unlocked

Exploit Ease: No known exploits are available

Patch Publication Date: 9/13/2016

Vulnerability Publication Date: 9/13/2016

Reference Information

CVE: CVE-2016-4620, CVE-2016-4719, CVE-2016-4740, CVE-2016-4741, CVE-2016-4746, CVE-2016-4747, CVE-2016-4749, CVE-2016-7759, CVE-2017-14315

BID: 92932

APPLE-SA: APPLE-SA-2016-09-13-1