Apple iOS < 10.3.1 RCE

high Nessus Network Monitor Plugin ID 700115
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is running a version of Apple iOS that is affected by a Remote Code Execution (RCE) attack vector.

Description

The version of iOS running on the mobile device is prior to 10.3.1, and is affected by an overflow condition that exists in the Wi-Fi HardMAC SoCs. The issue is triggered as input is not properly validated when handling FT-IEs in 802.11r Fast BSS Transition Authentication Responses. This may allow an proximate attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Solution

Upgrade to Apple iOS 10.3.1 or later.

See Also

https://support.apple.com/en-us/HT207688

Plugin Details

Severity: High

ID: 700115

Published: 5/17/2017

Updated: 3/6/2019

Dependencies: 8637

Nessus ID: 99185

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Patch Publication Date: 4/3/2017

Vulnerability Publication Date: 4/3/2017

Reference Information

CVE: CVE-2017-6975

BID: 97328