Apple iOS < 10.3.1 RCE

High Nessus Network Monitor Plugin ID 700115


The remote host is running a version of Apple iOS that is affected by a Remote Code Execution (RCE) attack vector.


The version of iOS running on the mobile device is prior to 10.3.1, and is affected by an overflow condition that exists in the Wi-Fi HardMAC SoCs. The issue is triggered as input is not properly validated when handling FT-IEs in 802.11r Fast BSS Transition Authentication Responses. This may allow an proximate attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.


Upgrade to Apple iOS 10.3.1 or later.

See Also

Plugin Details

Severity: High

ID: 700115

Published: 2017/05/17

Updated: 2019/03/06

Dependencies: 8637

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 8.4

Temporal Score: 8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:iphone_os

Patch Publication Date: 2017/04/03

Vulnerability Publication Date: 2017/04/03

Reference Information

CVE: CVE-2017-6975

BID: 97328