Apple iOS < 10.3.1 RCE

high Nessus Network Monitor Plugin ID 700115


The remote host is running a version of Apple iOS that is affected by a Remote Code Execution (RCE) attack vector.


The version of iOS running on the mobile device is prior to 10.3.1, and is affected by an overflow condition that exists in the Wi-Fi HardMAC SoCs. The issue is triggered as input is not properly validated when handling FT-IEs in 802.11r Fast BSS Transition Authentication Responses. This may allow an proximate attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.


Upgrade to Apple iOS 10.3.1 or later.

See Also

Plugin Details

Severity: High

ID: 700115

Published: 5/17/2017

Updated: 3/6/2019

Nessus ID: 99185

Risk Information


Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Risk Factor: High

Base Score: 8.4

Temporal Score: 8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Patch Publication Date: 4/3/2017

Vulnerability Publication Date: 4/3/2017

Reference Information

CVE: CVE-2017-6975

BID: 97328