Springboard in Apple iOS before 8.2 allows physically proximate attackers to bypass an intended activation requirement and read the home screen by leveraging an application crash during the activation process.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html | Vendor Advisory |
http://www.securitytracker.com/id/1031864 | |
https://support.apple.com/HT204423 | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html | Vendor Advisory |
http://www.securitytracker.com/id/1031864 | |
https://support.apple.com/HT204423 | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html - Vendor Advisory | |
References | () http://www.securitytracker.com/id/1031864 - | |
References | () https://support.apple.com/HT204423 - Vendor Advisory |
Information
Published : 2015-03-12 10:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1064
Mitre link : CVE-2015-1064
CVE.ORG link : CVE-2015-1064
JSON object : View
Products Affected
apple
- iphone_os
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor