Apple iOS < 10.3.1 RCE

high Nessus Network Monitor Plugin ID 700115

Synopsis

The remote host is running a version of Apple iOS that is affected by a Remote Code Execution (RCE) attack vector.

Description

The version of iOS running on the mobile device is prior to 10.3.1, and is affected by an overflow condition that exists in the Wi-Fi HardMAC SoCs. The issue is triggered as input is not properly validated when handling FT-IEs in 802.11r Fast BSS Transition Authentication Responses. This may allow an proximate attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Solution

Upgrade to Apple iOS 10.3.1 or later.

See Also

https://support.apple.com/en-us/HT207688

Plugin Details

Severity: High

ID: 700115

Published: 5/17/2017

Updated: 3/6/2019

Nessus ID: 99185

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Patch Publication Date: 4/3/2017

Vulnerability Publication Date: 4/3/2017

Reference Information

CVE: CVE-2017-6975

BID: 97328