Buffer Overflow Vulnerability in Apple iOS, macOS, tvOS, and watchOS Products
CVE-2018-4241

7.8HIGH

Key Information:

Vendor
Apple
Vendor
CVE Published:
8 June 2018

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant vulnerability has been identified in certain Apple products, where a buffer overflow in the 'mptcp_usr_connectx' function allows attackers to execute arbitrary code within a privileged context. This issue affects multiple operating systems, including iOS versions prior to 11.4, macOS versions prior to 10.13.5, tvOS versions prior to 11.4, and watchOS versions prior to 4.3.1. Exploitation of this vulnerability can occur through a specially crafted application, posing a serious threat to device integrity and user data.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.