CVE-2014-4352
18.09.2014, 10:55
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apple | iphone_os | 𝑥 ≤ 7.1.2 |
| apple | iphone_os | 7.0 |
| apple | iphone_os | 7.0.1 |
| apple | iphone_os | 7.0.2 |
| apple | iphone_os | 7.0.3 |
| apple | iphone_os | 7.0.4 |
| apple | iphone_os | 7.0.5 |
| apple | iphone_os | 7.0.6 |
| apple | iphone_os | 7.1 |
| apple | iphone_os | 7.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References