ID CVE-2018-5383
Summary Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.
References
Vulnerable Configurations
  • Google Android 6.0
    cpe:2.3:o:google:android:6.0
  • Google Android 6.0.1
    cpe:2.3:o:google:android:6.0.1
  • Google Android (Nougat) 7.0
    cpe:2.3:o:google:android:7.0
  • Google Android 7.1.1
    cpe:2.3:o:google:android:7.1.1
  • Google Android 7.1.2
    cpe:2.3:o:google:android:7.1.2
  • Google Android 8.0
    cpe:2.3:o:google:android:8.0
  • Google Android 8.1
    cpe:2.3:o:google:android:8.1
  • Apple iPhone OS 1.0.0
    cpe:2.3:o:apple:iphone_os:1.0.0
  • Apple iPhone OS 1.0.0 iPhone
    cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone
  • Apple iPhone OS 1.0.1
    cpe:2.3:o:apple:iphone_os:1.0.1
  • Apple iPhone OS 1.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone
  • Apple iPhone OS 1.0.2
    cpe:2.3:o:apple:iphone_os:1.0.2
  • Apple iPhone OS 1.0.2 iPhone
    cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone
  • Apple iPhone OS 1.1.0
    cpe:2.3:o:apple:iphone_os:1.1.0
  • Apple iPhone OS 1.1.0 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone
  • Apple iPhone OS 1.1.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch
  • Apple iPhone OS 1.1.1
    cpe:2.3:o:apple:iphone_os:1.1.1
  • Apple iPhone OS 1.1.1 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone
  • Apple iPhone OS 1.1.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.1:-:ipodtouch
  • Apple iPhone OS 1.1.2
    cpe:2.3:o:apple:iphone_os:1.1.2
  • Apple iPhone OS 1.1.2 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone
  • Apple iPhone OS 1.1.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch
  • Apple iPhone OS 1.1.3
    cpe:2.3:o:apple:iphone_os:1.1.3
  • Apple iPhone OS 1.1.3 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone
  • Apple iPhone OS 1.1.3 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch
  • Apple iPhone OS 1.1.4
    cpe:2.3:o:apple:iphone_os:1.1.4
  • Apple iPhone OS 1.1.4 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone
  • Apple iPhone OS 1.1.4 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch
  • Apple iPhone OS 1.1.5
    cpe:2.3:o:apple:iphone_os:1.1.5
  • Apple iPhone OS 1.1.5 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone
  • Apple iPhone OS 1.1.5 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch
  • Apple iPhone OS 2.0
    cpe:2.3:o:apple:iphone_os:2.0
  • Apple iPhone OS 2.0.0
    cpe:2.3:o:apple:iphone_os:2.0.0
  • Apple iPhone OS 2.0.0 iPhone
    cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone
  • Apple iPhone OS 2.0.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch
  • Apple iPhone OS 2.0.1
    cpe:2.3:o:apple:iphone_os:2.0.1
  • Apple iPhone OS 2.0.1
    cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone
  • Apple iPhone OS 2.0.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch
  • Apple iPhone OS 2.0.2
    cpe:2.3:o:apple:iphone_os:2.0.2
  • Apple iPhone OS 2.0.2 iPhone
    cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone
  • Apple iPhone OS 2.0.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch
  • Apple iPhone OS 2.1
    cpe:2.3:o:apple:iphone_os:2.1
  • Apple iPhone OS 2.1 iPhone
    cpe:2.3:o:apple:iphone_os:2.1:-:iphone
  • Apple iPhone OS 2.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch
  • Apple iPhone OS 2.1.1
    cpe:2.3:o:apple:iphone_os:2.1.1
  • Apple iPhone OS 2.2
    cpe:2.3:o:apple:iphone_os:2.2
  • Apple iPhone OS 2.2 iPhone
    cpe:2.3:o:apple:iphone_os:2.2:-:iphone
  • Apple iPhone OS 2.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.2:-:ipodtouch
  • Apple iPhone OS 2.2.1
    cpe:2.3:o:apple:iphone_os:2.2.1
  • Apple iPhone OS 2.2.1 iPhone
    cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone
  • Apple iPhone OS 2.2.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch
  • Apple iPhone OS 3.0
    cpe:2.3:o:apple:iphone_os:3.0
  • Apple iPhone OS 3.0 iPhone
    cpe:2.3:o:apple:iphone_os:3.0:-:iphone
  • Apple iPhone OS 3.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch
  • Apple iPhone OS 3.0.1
    cpe:2.3:o:apple:iphone_os:3.0.1
  • Apple iPhone OS 3.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:3.0.1:-:iphone
  • Apple iPhone OS 3.0.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch
  • Apple iPhone OS 3.1
    cpe:2.3:o:apple:iphone_os:3.1
  • Apple iPhone OS 3.1 for iPod Touch
    cpe:2.3:o:apple:iphone_os:3.1:-:-:-:-:ipod_touch
  • Apple iPhone OS 3.1 iPhone
    cpe:2.3:o:apple:iphone_os:3.1:-:iphone
  • Apple iPhone OS 3.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch
  • Apple iPhone OS 3.1.1 for iPod Touch
    cpe:2.3:o:apple:iphone_os:3.1.1:-:-:-:-:ipod_touch
  • Apple iPhone OS 3.1.2
    cpe:2.3:o:apple:iphone_os:3.1.2
  • Apple iPhone OS 3.1.2 iPhone
    cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone
  • Apple iPhone OS 3.1.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch
  • Apple iPhone OS 3.1.3
    cpe:2.3:o:apple:iphone_os:3.1.3
  • Apple iPhone OS 3.1.3 iPhone
    cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone
  • Apple iPhone OS 3.1.3 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.1.3:-:ipodtouch
  • Apple iPhone OS 3.2
    cpe:2.3:o:apple:iphone_os:3.2
  • Apple iPhone OS 3.2 iPhone
    cpe:2.3:o:apple:iphone_os:3.2:-:iphone
  • Apple iPhone OS 3.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch
  • Apple iPhone OS 3.2.1
    cpe:2.3:o:apple:iphone_os:3.2.1
  • Apple iPhone OS 3.2.1:-:ipad
    cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad
  • Apple iPhone OS 3.2.2
    cpe:2.3:o:apple:iphone_os:3.2.2
  • Apple iPhone OS 4.0
    cpe:2.3:o:apple:iphone_os:4.0
  • Apple iPhone OS 4.0 iPhone
    cpe:2.3:o:apple:iphone_os:4.0:-:iphone
  • Apple iPhone OS 4.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch
  • Apple iPhone OS 4.0.1
    cpe:2.3:o:apple:iphone_os:4.0.1
  • Apple iPhone OS 4.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone
  • Apple iPhone OS 4.0.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch
  • Apple iPhone OS 4.0.2
    cpe:2.3:o:apple:iphone_os:4.0.2
  • Apple iPhone OS 4.1
    cpe:2.3:o:apple:iphone_os:4.1
  • Apple iPhone OS 4.2.1
    cpe:2.3:o:apple:iphone_os:4.2.1
  • Apple iPhone OS 4.2.5
    cpe:2.3:o:apple:iphone_os:4.2.5
  • Apple iPhone OS 4.2.6
    cpe:2.3:o:apple:iphone_os:4.2.6
  • Apple iPhone OS 4.2.7
    cpe:2.3:o:apple:iphone_os:4.2.7
  • Apple iPhone OS 4.2.8
    cpe:2.3:o:apple:iphone_os:4.2.8
  • Apple iPhone OS 4.2.9
    cpe:2.3:o:apple:iphone_os:4.2.9
  • Apple iPhone OS 4.2.10
    cpe:2.3:o:apple:iphone_os:4.2.10
  • Apple iPhone OS 4.3.0
    cpe:2.3:o:apple:iphone_os:4.3.0
  • Apple iPhone OS 4.3.1
    cpe:2.3:o:apple:iphone_os:4.3.1
  • Apple iPhone OS 4.3.2
    cpe:2.3:o:apple:iphone_os:4.3.2
  • Apple iPhone OS 4.3.3
    cpe:2.3:o:apple:iphone_os:4.3.3
  • Apple iPhone OS 4.3.4
    cpe:2.3:o:apple:iphone_os:4.3.4
  • Apple iPhone OS 4.3.5
    cpe:2.3:o:apple:iphone_os:4.3.5
  • Apple iPhone OS 4.3.5 iPad
    cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad
  • Apple iPhone OS 4.3.5 iPodTouch
    cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch
  • Apple iPhone OS 5.0
    cpe:2.3:o:apple:iphone_os:5.0
  • Apple iPhone OS 5.0 iPad
    cpe:2.3:o:apple:iphone_os:5.0:-:ipad
  • Apple iPhone OS 5.0 iPhone
    cpe:2.3:o:apple:iphone_os:5.0:-:iphone
  • Apple iPhone OS 5.0iPod touch
    cpe:2.3:o:apple:iphone_os:5.0:-:ipodtouch
  • Apple iPhone OS 5.0.1
    cpe:2.3:o:apple:iphone_os:5.0.1
  • Apple iPhone OS 5.0.1 iPad
    cpe:2.3:o:apple:iphone_os:5.0.1:-:ipad
  • Apple iPhone OS 5.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:5.0.1:-:iphone
  • Apple iPhone OS 5.0.1 iPod touch
    cpe:2.3:o:apple:iphone_os:5.0.1:-:ipodtouch
  • Apple iPhone OS 5.1
    cpe:2.3:o:apple:iphone_os:5.1
  • Apple iPhone OS 5.1.1
    cpe:2.3:o:apple:iphone_os:5.1.1
  • Apple iPhone OS 6.0
    cpe:2.3:o:apple:iphone_os:6.0
  • Apple iPhone OS 6.0.1
    cpe:2.3:o:apple:iphone_os:6.0.1
  • Apple iPhone OS 6.0.2
    cpe:2.3:o:apple:iphone_os:6.0.2
  • Apple iPhone OS 6.1
    cpe:2.3:o:apple:iphone_os:6.1
  • Apple iPhone OS 6.1.2
    cpe:2.3:o:apple:iphone_os:6.1.2
  • Apple iPhone OS 6.1.3
    cpe:2.3:o:apple:iphone_os:6.1.3
  • Apple iPhone OS 6.1.4
    cpe:2.3:o:apple:iphone_os:6.1.4
  • Apple iPhone OS 6.1.5
    cpe:2.3:o:apple:iphone_os:6.1.5
  • Apple iPhone OS 6.1.6
    cpe:2.3:o:apple:iphone_os:6.1.6
  • Apple iPhone OS 7.0
    cpe:2.3:o:apple:iphone_os:7.0
  • Apple iPhone OS 7.0.1
    cpe:2.3:o:apple:iphone_os:7.0.1
  • Apple iPhone OS 7.0.2
    cpe:2.3:o:apple:iphone_os:7.0.2
  • Apple iPhone OS 7.0.3
    cpe:2.3:o:apple:iphone_os:7.0.3
  • Apple iPhone OS 7.0.4
    cpe:2.3:o:apple:iphone_os:7.0.4
  • Apple iPhone OS 7.0.5
    cpe:2.3:o:apple:iphone_os:7.0.5
  • Apple iPhone OS 7.0.6
    cpe:2.3:o:apple:iphone_os:7.0.6
  • Apple iPhone OS 7.1
    cpe:2.3:o:apple:iphone_os:7.1
  • Apple iPhone OS 7.1.1
    cpe:2.3:o:apple:iphone_os:7.1.1
  • Apple iPhone OS 7.1.2
    cpe:2.3:o:apple:iphone_os:7.1.2
  • Apple iPhone OS 8.0
    cpe:2.3:o:apple:iphone_os:8.0
  • Apple iPhone OS 8.0.1
    cpe:2.3:o:apple:iphone_os:8.0.1
  • Apple iPhone OS 8.0.2
    cpe:2.3:o:apple:iphone_os:8.0.2
  • Apple iPhone OS 8.1
    cpe:2.3:o:apple:iphone_os:8.1
  • Apple iPhone OS 8.1.1
    cpe:2.3:o:apple:iphone_os:8.1.1
  • Apple iPhone OS 8.1.2
    cpe:2.3:o:apple:iphone_os:8.1.2
  • Apple iPhone OS 8.1.3
    cpe:2.3:o:apple:iphone_os:8.1.3
  • Apple iPhone OS 8.2
    cpe:2.3:o:apple:iphone_os:8.2
  • Apple iPhone OS 8.3
    cpe:2.3:o:apple:iphone_os:8.3
  • Apple iPhone OS 8.4
    cpe:2.3:o:apple:iphone_os:8.4
  • Apple iPhone OS 8.4.1
    cpe:2.3:o:apple:iphone_os:8.4.1
  • Apple iPhone OS 9.0
    cpe:2.3:o:apple:iphone_os:9.0
  • Apple iPhone OS 9.0.1
    cpe:2.3:o:apple:iphone_os:9.0.1
  • Apple iPhone OS 9.0.2
    cpe:2.3:o:apple:iphone_os:9.0.2
  • Apple iPhone OS 9.1
    cpe:2.3:o:apple:iphone_os:9.1
  • Apple iPhone OS 9.2
    cpe:2.3:o:apple:iphone_os:9.2
  • Apple iPhone OS 9.2.1
    cpe:2.3:o:apple:iphone_os:9.2.1
  • Apple iPhone OS 9.3
    cpe:2.3:o:apple:iphone_os:9.3
  • Apple iPhone OS 9.3.1
    cpe:2.3:o:apple:iphone_os:9.3.1
  • Apple iPhone OS 9.3.2
    cpe:2.3:o:apple:iphone_os:9.3.2
  • Apple iPhone OS 9.3.3
    cpe:2.3:o:apple:iphone_os:9.3.3
  • Apple iPhone OS 9.3.4
    cpe:2.3:o:apple:iphone_os:9.3.4
  • Apple iPhone OS 9.3.5
    cpe:2.3:o:apple:iphone_os:9.3.5
  • Apple iPhone OS 9.3.6
    cpe:2.3:o:apple:iphone_os:9.3.6
  • Apple iPhone OS 10.0
    cpe:2.3:o:apple:iphone_os:10.0
  • Apple iPhone OS 10.0.1
    cpe:2.3:o:apple:iphone_os:10.0.1
  • Apple iPhone OS 10.0.2
    cpe:2.3:o:apple:iphone_os:10.0.2
  • Apple iPhone OS 10.0.3
    cpe:2.3:o:apple:iphone_os:10.0.3
  • Apple iPhone OS 10.1
    cpe:2.3:o:apple:iphone_os:10.1
  • Apple iPhone OS 10.1.1
    cpe:2.3:o:apple:iphone_os:10.1.1
  • Apple iPhone OS 10.2
    cpe:2.3:o:apple:iphone_os:10.2
  • Apple iPhone OS 10.2.1
    cpe:2.3:o:apple:iphone_os:10.2.1
  • Apple iPhone OS 10.3
    cpe:2.3:o:apple:iphone_os:10.3
  • Apple iPhone OS 10.3.1
    cpe:2.3:o:apple:iphone_os:10.3.1
  • Apple iPhone OS 10.3.2
    cpe:2.3:o:apple:iphone_os:10.3.2
  • Apple iPhone OS 10.3.3
    cpe:2.3:o:apple:iphone_os:10.3.3
  • Apple iPhone OS 10.3.4
    cpe:2.3:o:apple:iphone_os:10.3.4
  • Apple iPhone OS 11
    cpe:2.3:o:apple:iphone_os:11
  • Apple iPhone OS 11.0
    cpe:2.3:o:apple:iphone_os:11.0
  • Apple iPhone OS 11.0.1
    cpe:2.3:o:apple:iphone_os:11.0.1
  • Apple iPhone OS 11.0.2
    cpe:2.3:o:apple:iphone_os:11.0.2
  • Apple iPhone OS 11.0.3
    cpe:2.3:o:apple:iphone_os:11.0.3
  • Apple iPhone OS 11.1
    cpe:2.3:o:apple:iphone_os:11.1
  • Apple iPhone OS 11.1.1
    cpe:2.3:o:apple:iphone_os:11.1.1
  • Apple iPhone OS 11.1.2
    cpe:2.3:o:apple:iphone_os:11.1.2
  • Apple iPhone OS 11.2
    cpe:2.3:o:apple:iphone_os:11.2
  • Apple iPhone OS 11.2.1
    cpe:2.3:o:apple:iphone_os:11.2.1
  • Apple iPhone OS 11.2.2
    cpe:2.3:o:apple:iphone_os:11.2.2
  • Apple iPhone OS 11.2.5
    cpe:2.3:o:apple:iphone_os:11.2.5
  • Apple iPhone OS 11.2.6
    cpe:2.3:o:apple:iphone_os:11.2.6
  • Apple iPhone OS 11.3
    cpe:2.3:o:apple:iphone_os:11.3
  • Apple iPhone OS 11.3.1
    cpe:2.3:o:apple:iphone_os:11.3.1
  • Apple Mac OS X
    cpe:2.3:o:apple:mac_os_x
  • Apple Mac OS X 10.0
    cpe:2.3:o:apple:mac_os_x:10.0
  • Apple Mac OS X 10.0.0
    cpe:2.3:o:apple:mac_os_x:10.0.0
  • Apple Mac OS X 10.0.1
    cpe:2.3:o:apple:mac_os_x:10.0.1
  • Apple Mac OS X 10.0.2
    cpe:2.3:o:apple:mac_os_x:10.0.2
  • Apple Mac OS X 10.0.3
    cpe:2.3:o:apple:mac_os_x:10.0.3
  • Apple Mac OS X 10.0.4
    cpe:2.3:o:apple:mac_os_x:10.0.4
  • Apple Mac OS X 10.1
    cpe:2.3:o:apple:mac_os_x:10.1
  • Apple Mac OS X 10.1.0
    cpe:2.3:o:apple:mac_os_x:10.1.0
  • Apple Mac OS X 10.1.1
    cpe:2.3:o:apple:mac_os_x:10.1.1
  • Apple Mac OS X 10.1.2
    cpe:2.3:o:apple:mac_os_x:10.1.2
  • Apple Mac OS X 10.1.3
    cpe:2.3:o:apple:mac_os_x:10.1.3
  • Apple Mac OS X 10.1.4
    cpe:2.3:o:apple:mac_os_x:10.1.4
  • Apple Mac OS X 10.1.5
    cpe:2.3:o:apple:mac_os_x:10.1.5
  • Apple Mac OS X 10.2
    cpe:2.3:o:apple:mac_os_x:10.2
  • Apple Mac OS X 10.2.0
    cpe:2.3:o:apple:mac_os_x:10.2.0
  • Apple Mac OS X 10.2.1
    cpe:2.3:o:apple:mac_os_x:10.2.1
  • Apple Mac OS X 10.2.2
    cpe:2.3:o:apple:mac_os_x:10.2.2
  • Apple Mac OS X 10.2.3
    cpe:2.3:o:apple:mac_os_x:10.2.3
  • Apple Mac OS X 10.2.4
    cpe:2.3:o:apple:mac_os_x:10.2.4
  • Apple Mac OS X 10.2.5
    cpe:2.3:o:apple:mac_os_x:10.2.5
  • Apple Mac OS X 10.2.6
    cpe:2.3:o:apple:mac_os_x:10.2.6
  • Apple Mac OS X 10.2.7
    cpe:2.3:o:apple:mac_os_x:10.2.7
  • Apple Mac OS X 10.2.8
    cpe:2.3:o:apple:mac_os_x:10.2.8
  • Apple Mac OS X 10.3
    cpe:2.3:o:apple:mac_os_x:10.3
  • Apple Mac OS X 10.3.0
    cpe:2.3:o:apple:mac_os_x:10.3.0
  • Apple Mac OS X 10.3.1
    cpe:2.3:o:apple:mac_os_x:10.3.1
  • Apple Mac OS X 10.3.2
    cpe:2.3:o:apple:mac_os_x:10.3.2
  • Apple Mac OS X 10.3.3
    cpe:2.3:o:apple:mac_os_x:10.3.3
  • Apple Mac OS X 10.3.4
    cpe:2.3:o:apple:mac_os_x:10.3.4
  • Apple Mac OS X 10.3.5
    cpe:2.3:o:apple:mac_os_x:10.3.5
  • Apple Mac OS X 10.3.6
    cpe:2.3:o:apple:mac_os_x:10.3.6
  • Apple Mac OS X 10.3.7
    cpe:2.3:o:apple:mac_os_x:10.3.7
  • Apple Mac OS X 10.3.8
    cpe:2.3:o:apple:mac_os_x:10.3.8
  • Apple Mac OS X 10.3.9
    cpe:2.3:o:apple:mac_os_x:10.3.9
  • Apple Mac OS X 10.4
    cpe:2.3:o:apple:mac_os_x:10.4
  • Apple Mac OS X 10.4.0
    cpe:2.3:o:apple:mac_os_x:10.4.0
  • Apple Mac OS X 10.4.1
    cpe:2.3:o:apple:mac_os_x:10.4.1
  • Apple Mac OS X 10.4.2
    cpe:2.3:o:apple:mac_os_x:10.4.2
  • Apple Mac OS X 10.4.3
    cpe:2.3:o:apple:mac_os_x:10.4.3
  • Apple Mac OS X 10.4.4
    cpe:2.3:o:apple:mac_os_x:10.4.4
  • Apple Mac OS X 10.4.5
    cpe:2.3:o:apple:mac_os_x:10.4.5
  • Apple Mac OS X 10.4.6
    cpe:2.3:o:apple:mac_os_x:10.4.6
  • Apple Mac OS X 10.4.7
    cpe:2.3:o:apple:mac_os_x:10.4.7
  • Apple Mac OS X 10.4.8
    cpe:2.3:o:apple:mac_os_x:10.4.8
  • Apple Mac OS X 10.4.9
    cpe:2.3:o:apple:mac_os_x:10.4.9
  • Apple Mac OS X 10.4.10
    cpe:2.3:o:apple:mac_os_x:10.4.10
  • Apple Mac OS X 10.4.11
    cpe:2.3:o:apple:mac_os_x:10.4.11
  • Apple Mac OS X 10.5
    cpe:2.3:o:apple:mac_os_x:10.5
  • Apple Mac OS X 10.5.0
    cpe:2.3:o:apple:mac_os_x:10.5.0
  • Apple Mac OS X 10.5.1
    cpe:2.3:o:apple:mac_os_x:10.5.1
  • Apple Mac OS X 10.5.2
    cpe:2.3:o:apple:mac_os_x:10.5.2
  • Apple Mac OS X 10.5.3
    cpe:2.3:o:apple:mac_os_x:10.5.3
  • Apple Mac OS X 10.5.4
    cpe:2.3:o:apple:mac_os_x:10.5.4
  • Apple Mac OS X 10.5.5
    cpe:2.3:o:apple:mac_os_x:10.5.5
  • Apple Mac OS X 10.5.6
    cpe:2.3:o:apple:mac_os_x:10.5.6
  • Apple Mac OS X 10.5.7
    cpe:2.3:o:apple:mac_os_x:10.5.7
  • Apple Mac OS X 10.5.8
    cpe:2.3:o:apple:mac_os_x:10.5.8
  • Apple Mac OS X 10.6.0
    cpe:2.3:o:apple:mac_os_x:10.6.0
  • Apple Mac OS X 10.6.1
    cpe:2.3:o:apple:mac_os_x:10.6.1
  • Apple Mac OS X 10.6.2
    cpe:2.3:o:apple:mac_os_x:10.6.2
  • Apple Mac OS X 10.6.3
    cpe:2.3:o:apple:mac_os_x:10.6.3
  • Apple Mac OS X 10.6.4
    cpe:2.3:o:apple:mac_os_x:10.6.4
  • Apple Mac OS X 10.6.5
    cpe:2.3:o:apple:mac_os_x:10.6.5
  • Apple Mac OS X 10.6.6
    cpe:2.3:o:apple:mac_os_x:10.6.6
  • Apple Mac OS X 10.6.7
    cpe:2.3:o:apple:mac_os_x:10.6.7
  • Apple Mac OS X 10.6.8
    cpe:2.3:o:apple:mac_os_x:10.6.8
  • Apple Mac OS X 10.7.0
    cpe:2.3:o:apple:mac_os_x:10.7.0
  • Apple Mac OS X 10.7.1
    cpe:2.3:o:apple:mac_os_x:10.7.1
  • Apple Mac OS X 10.7.2
    cpe:2.3:o:apple:mac_os_x:10.7.2
  • Apple Mac OS X 10.7.3
    cpe:2.3:o:apple:mac_os_x:10.7.3
  • Apple Mac OS X 10.7.4
    cpe:2.3:o:apple:mac_os_x:10.7.4
  • Apple Mac OS X 10.7.5
    cpe:2.3:o:apple:mac_os_x:10.7.5
  • Apple Mac OS X 10.8.0
    cpe:2.3:o:apple:mac_os_x:10.8.0
  • Apple Mac OS X 10.8.1
    cpe:2.3:o:apple:mac_os_x:10.8.1
  • Apple Mac OS X 10.8.2
    cpe:2.3:o:apple:mac_os_x:10.8.2
  • Apple Mac OS X 10.8.3
    cpe:2.3:o:apple:mac_os_x:10.8.3
  • Apple Mac OS X 10.8.4
    cpe:2.3:o:apple:mac_os_x:10.8.4
  • Apple Mac OS X 10.8.5
    cpe:2.3:o:apple:mac_os_x:10.8.5
  • Apple Mac OS X 10.8.5 Supplemental Update
    cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update
  • Apple Mac OS X 10.9
    cpe:2.3:o:apple:mac_os_x:10.9
  • Apple Mac OS X 10.9.1 (Mavericks)
    cpe:2.3:o:apple:mac_os_x:10.9.1
  • Apple Mac OS X 10.9.2
    cpe:2.3:o:apple:mac_os_x:10.9.2
  • Apple Mac OS X 10.9.3
    cpe:2.3:o:apple:mac_os_x:10.9.3
  • Apple Mac OS X 10.9.4
    cpe:2.3:o:apple:mac_os_x:10.9.4
  • Apple Mac OS X 10.9.5
    cpe:2.3:o:apple:mac_os_x:10.9.5
  • Apple Mac OS X 10.10.0
    cpe:2.3:o:apple:mac_os_x:10.10.0
  • Apple Mac OS X 10.10.1
    cpe:2.3:o:apple:mac_os_x:10.10.1
  • Apple Mac OS X Yosemite 10.10.2
    cpe:2.3:o:apple:mac_os_x:10.10.2
  • Apple Mac OS X 10.10.3
    cpe:2.3:o:apple:mac_os_x:10.10.3
  • Apple Mac OS X 10.10.4
    cpe:2.3:o:apple:mac_os_x:10.10.4
  • Apple Mac OS X 10.10.5
    cpe:2.3:o:apple:mac_os_x:10.10.5
  • Apple Mac OS X 10.11.0
    cpe:2.3:o:apple:mac_os_x:10.11.0
  • Apple Mac OS X 10.11.1
    cpe:2.3:o:apple:mac_os_x:10.11.1
  • Apple Mac OS X 10.11.2
    cpe:2.3:o:apple:mac_os_x:10.11.2
  • Apple Mac OS X 10.11.3
    cpe:2.3:o:apple:mac_os_x:10.11.3
  • Apple Mac OS X 10.11.4
    cpe:2.3:o:apple:mac_os_x:10.11.4
  • Apple Mac OS X 10.11.5
    cpe:2.3:o:apple:mac_os_x:10.11.5
  • Apple Mac OS X 10.11.6
    cpe:2.3:o:apple:mac_os_x:10.11.6
  • Apple Mac OS X 10.12
    cpe:2.3:o:apple:mac_os_x:10.12
  • Apple macOS 10.12.0
    cpe:2.3:o:apple:mac_os_x:10.12.0
  • Apple Mac OS X 10.12.1
    cpe:2.3:o:apple:mac_os_x:10.12.1
  • Apple Mac OS X 10.12.2
    cpe:2.3:o:apple:mac_os_x:10.12.2
  • Apple Mac OS X 10.12.3
    cpe:2.3:o:apple:mac_os_x:10.12.3
  • Apple Mac OS X 10.12.4
    cpe:2.3:o:apple:mac_os_x:10.12.4
  • Apple Mac OS X 10.12.5
    cpe:2.3:o:apple:mac_os_x:10.12.5
  • Apple Mac OS X 10.12.6
    cpe:2.3:o:apple:mac_os_x:10.12.6
CVSS
Base: 4.3
Impact:
Exploitability:
CWE CWE-347
CAPEC
  • Padding Oracle Crypto Attack
    An attacker is able to efficiently decrypt data without knowing the decryption key if a target system leaks data on whether or not a padding error happened while decrypting the ciphertext. A target system that leaks this type of information becomes the padding oracle and an attacker is able to make use of that oracle to efficiently decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). In addition to performing decryption, an attacker is also able to produce valid ciphertexts (i.e., perform encryption) by using the padding oracle, all without knowing the encryption key. Any cryptosystem can be vulnerable to padding oracle attacks if the encrypted messages are not authenticated to ensure their validity prior to decryption, and then the information about padding error is leaked to the attacker. This attack technique may be used, for instance, to break CAPTCHA systems or decrypt/modify state information stored in client side objects (e.g., hidden fields or cookies). This attack technique is a side-channel attack on the cryptosystem that uses a data leak from an improperly implemented decryption routine to completely subvert the cryptosystem. The one bit of information that tells the attacker whether a padding error during decryption has occurred, in whatever form it comes, is sufficient for the attacker to break the cryptosystem. That bit of information can come in a form of an explicit error message about a padding error, a returned blank page, or even the server taking longer to respond (a timing attack). This attack can be launched cross domain where an attacker is able to use cross-domain information leaks to get the bits of information from the padding oracle from a target system / service with which the victim is communicating. To do so an attacker sends a request containing ciphertext to the target system. Due to the browser's same origin policy, the attacker is not able to see the response directly, but can use cross-domain information leak techniques to still get the information needed (i.e., information on whether or not a padding error has occurred). For instance, this can be done using "img" tag plus the onerror()/onload() events. The attacker's JavaScript can make web browsers to load an image on the target site, and know if the image is loaded or not. This is 1-bit information needed for the padding oracle attack to work: if the image is loaded, then it is valid padding, otherwise it is not.
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_10_13_5.NASL
    description The remote host is running a version of macOS / Mac OS X that is 10.13.x prior to 10.13.5. It is, therefore, affected by multiple vulnerabilities. Note that successful exploitation of the most serious issues can result in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-12-21
    plugin id 110324
    published 2018-06-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110324
    title macOS 10.13.x < 10.13.5 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2018-004.NASL
    description The remote host is running Mac OS X 10.11.6 or Mac OS X 10.12.6 and is missing a security update. It is therefore, affected by multiple vulnerabilities.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 111136
    published 2018-07-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111136
    title macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-004)
  • NASL family Misc.
    NASL id APPLETV_12.NASL
    description According to its banner, the version of Apple TV on the remote device is prior to 12. It is, therefore, affected by multiple vulnerabilities as described in the HT209107 security advisory. Note that only 4th and 5th generation models are affected by these vulnerabilities.
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 117588
    published 2018-09-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117588
    title Apple TV < 12 Multiple Vulnerabilities
  • NASL family Misc.
    NASL id APPLETV_11_4.NASL
    description According to its banner, the version of Apple TV on the remote device is prior to 11.4. It is, therefore, affected by multiple vulnerabilities as described in the HT208850 security advisory. Note that only 4th and 5th generation models are affected by these vulnerabilities.
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 110325
    published 2018-06-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110325
    title Apple TV < 11.4 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_10_14.NASL
    description The remote host is running a version of Mac OS X that is prior to 10.13.6 or is not macOS 10.14. It is, therefore, affected by multiple vulnerabilities in the following components : - afpserver - AppleGraphicsControl - Application Firewall - App Store - APR - ATS - Auto Unlock - Bluetooth - CFNetwork - CoreFoundation - CoreText - Crash Reporter - CUPS - Dictionary - Grand Central Dispatch - Heimdal - Hypervisor - iBooks - Intel Graphics Driver - IOHIDFamily - IOKit - IOUserEthernet - Kernel - LibreSSL - Login Window - mDNSOffloadUserClient - MediaRemote - Microcode - Security - Spotlight - Symptom Framework - Text - Wi-Fi Note that successful exploitation of the most serious issues can result in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 118178
    published 2018-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118178
    title macOS < 10.14 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOS_10_13_6.NASL
    description The remote host is running a version of macOS / Mac OS X that is 10.13.x prior to 10.13.6. It is, therefore, affected by multiple vulnerabilities. Note that successful exploitation of the most serious issues can result in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-12-07
    plugin id 111137
    published 2018-07-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111137
    title macOS 10.13.x < 10.13.6 Multiple Vulnerabilities
refmap via4
bid 104879
cert-vn VU#304725
confirm https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
misc http://www.cs.technion.ac.il/~biham/BT/
mlist [debian-lts-announce] 20190402 [SECURITY] [DLA 1747-1] firmware-nonfree security update
sectrack 1041432
the hacker news via4
id THN:16562FEEF7E15AF5116B1FB18B40ECE1
last seen 2018-07-24
modified 2018-07-24
published 2018-07-24
reporter The Hacker News
source https://thehackernews.com/2018/07/bluetooth-hack-vulnerability.html
title New Bluetooth Hack Affects Millions of Devices from Major Vendors
Last major update 07-08-2018 - 17:29
Published 07-08-2018 - 17:29
Last modified 02-10-2019 - 20:03
Back to Top