ID CVE-2016-1731
Summary Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for man-in-the-middle attackers to spoof updates by modifying the client-server data stream.
References
Vulnerable Configurations
  • cpe:2.3:a:apple:software_update:-:*:*:*:*:*:*:*
    cpe:2.3:a:apple:software_update:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:software_update:2.1.0.110:*:*:*:*:*:*:*
    cpe:2.3:a:apple:software_update:2.1.0.110:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:software_update:2.1.1.116:*:*:*:*:*:*:*
    cpe:2.3:a:apple:software_update:2.1.1.116:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:software_update:2.1.2.120:*:*:*:*:*:*:*
    cpe:2.3:a:apple:software_update:2.1.2.120:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:software_update:2.1.3.127:*:*:*:*:*:*:*
    cpe:2.3:a:apple:software_update:2.1.3.127:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 03-12-2016 - 03:22)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 84283
confirm https://support.apple.com/kb/HT206091
sectrack 1035256
Last major update 03-12-2016 - 03:22
Published 14-03-2016 - 01:59
Last modified 03-12-2016 - 03:22
Back to Top