var-202012-0780
Vulnerability from variot
A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.4.9. A user may send video in Group FaceTime calls without knowing that they have done so. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. This vulnerability number has been assigned, and the vulnerability details will be updated soon. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2020-11-05-2 iOS 12.4.9
iOS 12.4.9 is now available and address the following issues. Information about the security content is also available at https://support.apple.com/HT211940. CVE-2020-27929: James P (@Jam_Penn)
FontParser Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2 and 3, iPod touch (6th generation) Impact: Processing a maliciously crafted font may lead to arbitrary code execution. Apple is aware of reports that an exploit for this issue exists in the wild. CVE-2020-27930: Google Project Zero
Kernel Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2 and 3, iPod touch (6th generation) Impact: A malicious application may be able to disclose kernel memory. Apple is aware of reports that an exploit for this issue exists in the wild. CVE-2020-27950: Google Project Zero
Kernel Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2 and 3, iPod touch (6th generation) Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild. CVE-2020-27932: Google Project Zero
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "iOS 12.4.9".
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl+kfiwACgkQZcsbuWJ6 jjDngw//RguLwNx38u/bzvLSO9YOg4k1FOlRViWjznAtxG8TcFI27Bn5EJGvTCQL Be5sAgLarhYYg29fuap/zGqURzmHAUkygmb7SBlWsEagogPDYFLfFIvwTbKuC9XX n8v7LDAfpVKUmhPkLUuS78Gsk5RawQubYhHT7Q1I1KAixMirzQ39mH8dS6ZfRxpG 7f6qyYOP4a5kyXb7ALWZO6uZa4H1WgfMFpyk3VrEHE2s5A50zi6Lqj8IDepOSJAF eHMvuHUU0D2Sd1od9OTHmfgBoKVN3S6VWMLyFuebtRwHIwQmVYK+IuMoDOuzmLbW RVhqdfnCFgDoSvZmPZoFJrlTz9bURTFFN9OHPTB9aLtkAqvywcQYoljrOh+rdj/I L680osf5g7+1K/MP265ihPMdXuVkD4g5UaMICf8PT+DSWDg77i4fI6Pf77mDU82G ronucK6J9LPA4fD7o0Ufh4dA2swzgycSIJIJVYQT+/1ZZ+iL9Pl84YqDEnQPlqT/ QGS078jSVGWLiJ5JXTYHS6X1c2D2UJtKCCfP8kJk/dKDtwcAPcRbrvvh8dBXIC35 vy/3lR2upLnaRJPM4x7bCdilPCDOpSsMq+p/UTjB0U17LGrcU4MX5CnXfaMq5ZGi u+QuaGhyR/9tlc/Ft9JolSNtmOV9H4w+460gBejle/iPi9R1tsE= =bql1 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-0780", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.4.9" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(ipad mini 3)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(iphone 6 plus)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(ipod touch no. 6 generation )" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(ipad mini 2)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(ipad air)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(iphone 6)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(iphone 5s)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "12.4.9" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "NVD", "id": "CVE-2020-27929" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "159960" }, { "db": "CNNVD", "id": "CNNVD-202011-571" } ], "trust": 0.7 }, "cve": "CVE-2020-27929", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-27929", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-372040", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2020-27929", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-27929", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-27929", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-27929", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202011-571", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-372040", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-372040" }, { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "CNNVD", "id": "CNNVD-202011-571" }, { "db": "NVD", "id": "CVE-2020-27929" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.4.9. A user may send video in Group FaceTime calls without knowing that they have done so. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. This vulnerability number has been assigned, and the vulnerability details will be updated soon. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2020-11-05-2 iOS 12.4.9\n\niOS 12.4.9 is now available and address the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT211940. \nCVE-2020-27929: James P (@Jam_Penn)\n\nFontParser\nAvailable for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2\nand 3, iPod touch (6th generation)\nImpact: Processing a maliciously crafted font may lead to arbitrary\ncode execution. Apple is aware of reports that an exploit for this\nissue exists in the wild. \nCVE-2020-27930: Google Project Zero\n\nKernel\nAvailable for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2\nand 3, iPod touch (6th generation)\nImpact: A malicious application may be able to disclose kernel\nmemory. Apple is aware of reports that an exploit for this issue\nexists in the wild. \nCVE-2020-27950: Google Project Zero\n\nKernel\nAvailable for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2\nand 3, iPod touch (6th generation)\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges. Apple is aware of reports that an exploit for\nthis issue exists in the wild. \nCVE-2020-27932: Google Project Zero\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"iOS 12.4.9\". \n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nu+QuaGhyR/9tlc/Ft9JolSNtmOV9H4w+460gBejle/iPi9R1tsE=\n=bql1\n-----END PGP SIGNATURE-----\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2020-27929" }, { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "VULHUB", "id": "VHN-372040" }, { "db": "PACKETSTORM", "id": "159960" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-372040", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-372040" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-27929", "trust": 2.6 }, { "db": "PACKETSTORM", "id": "159960", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU99462952", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-014254", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.3910", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202011-571", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-372040", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-372040" }, { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "PACKETSTORM", "id": "159960" }, { "db": "CNNVD", "id": "CNNVD-202011-571" }, { "db": "NVD", "id": "CVE-2020-27929" } ] }, "id": "VAR-202012-0780", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-372040" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:12:25.838000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT211940 Apple\u00a0 Security update", "trust": 0.8, "url": "https://support.apple.com/en-us/HT211940" }, { "title": "Apple iOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=136250" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "CNNVD", "id": "CNNVD-202011-571" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Other (CWE-Other) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "NVD", "id": "CVE-2020-27929" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.apple.com/en-us/ht211940" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27929" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu99462952/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3910/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-ios-12-multiple-vulnerabilities-33840" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159960/apple-security-advisory-2020-11-05-2.html" }, { "trust": 0.6, "url": "https://support.apple.com/kb/ht211940" }, { "trust": 0.1, "url": "https://support.apple.com/ht211940." }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27932" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27930" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27950" } ], "sources": [ { "db": "VULHUB", "id": "VHN-372040" }, { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "PACKETSTORM", "id": "159960" }, { "db": "CNNVD", "id": "CNNVD-202011-571" }, { "db": "NVD", "id": "CVE-2020-27929" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-372040" }, { "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "db": "PACKETSTORM", "id": "159960" }, { "db": "CNNVD", "id": "CNNVD-202011-571" }, { "db": "NVD", "id": "CVE-2020-27929" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-08T00:00:00", "db": "VULHUB", "id": "VHN-372040" }, { "date": "2021-08-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "date": "2020-11-09T18:30:52", "db": "PACKETSTORM", "id": "159960" }, { "date": "2020-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-571" }, { "date": "2020-12-08T21:15:13.763000", "db": "NVD", "id": "CVE-2020-27929" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-09T00:00:00", "db": "VULHUB", "id": "VHN-372040" }, { "date": "2021-08-12T08:50:00", "db": "JVNDB", "id": "JVNDB-2020-014254" }, { "date": "2020-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-571" }, { "date": "2024-11-21T05:22:04.307000", "db": "NVD", "id": "CVE-2020-27929" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-571" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iOS\u00a0 of \u00a0 group \u00a0FaceTime\u00a0 Logic vulnerabilities in calls", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014254" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-571" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.