CVE-2014-4352
18.09.2014, 10:55
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.Enginsight
Vendor | Product | Version |
---|---|---|
apple | iphone_os | 𝑥 ≤ 7.1.2 |
apple | iphone_os | 7.0 |
apple | iphone_os | 7.0.1 |
apple | iphone_os | 7.0.2 |
apple | iphone_os | 7.0.3 |
apple | iphone_os | 7.0.4 |
apple | iphone_os | 7.0.5 |
apple | iphone_os | 7.0.6 |
apple | iphone_os | 7.1 |
apple | iphone_os | 7.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References