CVE-2014-4354
18.09.2014, 10:55
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.Enginsight
Vendor | Product | Version |
---|---|---|
apple | iphone_os | 𝑥 ≤ 7.1.2 |
apple | iphone_os | 7.0 |
apple | iphone_os | 7.0.1 |
apple | iphone_os | 7.0.2 |
apple | iphone_os | 7.0.3 |
apple | iphone_os | 7.0.4 |
apple | iphone_os | 7.0.5 |
apple | iphone_os | 7.0.6 |
apple | iphone_os | 7.1 |
apple | iphone_os | 7.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References