ID

VAR-201704-0826


CVE

CVE-2017-2452


TITLE

Apple iOS of Siri Component lock screen text message vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-002411

DESCRIPTION

An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "Siri" component. It allows physically proximate attackers to read text messages on the lock screen via unspecified vectors. Apple iOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to obtain sensitive information, bypass security restrictions and perform unauthorized actions, will result in the execution of arbitrary script code in the browser of an unsuspecting user in the context of the affected site or gain sensitive information. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. Attackers can exploit this vulnerability to obtain SMS content

Trust: 1.98

sources: NVD: CVE-2017-2452 // JVNDB: JVNDB-2017-002411 // BID: 97138 // VULHUB: VHN-110655

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:lteversion:10.2.1

Trust: 1.0

vendor:applemodel:iosscope:ltversion:10.3 (ipad first 4 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10.3 (iphone 5 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10.3 (ipod touch first 6 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:10.2.1

Trust: 0.6

vendor:applemodel:iosscope:eqversion:50

Trust: 0.3

vendor:applemodel:iosscope:eqversion:40

Trust: 0.3

vendor:applemodel:iosscope:eqversion:30

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10

Trust: 0.3

vendor:applemodel:iosscope:neversion:10.3

Trust: 0.3

sources: BID: 97138 // JVNDB: JVNDB-2017-002411 // CNNVD: CNNVD-201703-1293 // NVD: CVE-2017-2452

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2452
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-2452
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201703-1293
value: LOW

Trust: 0.6

VULHUB: VHN-110655
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-2452
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-110655
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2452
baseSeverity: MEDIUM
baseScore: 4.6
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110655 // JVNDB: JVNDB-2017-002411 // CNNVD: CNNVD-201703-1293 // NVD: CVE-2017-2452

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-110655 // JVNDB: JVNDB-2017-002411 // NVD: CVE-2017-2452

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201703-1293

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201703-1293

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002411

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT207617url:https://support.apple.com/en-us/HT207617

Trust: 0.8

title:HT207617url:https://support.apple.com/ja-jp/HT207617

Trust: 0.8

title:Apple iOS Siri Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68844

Trust: 0.6

sources: JVNDB: JVNDB-2017-002411 // CNNVD: CNNVD-201703-1293

EXTERNAL IDS

db:NVDid:CVE-2017-2452

Trust: 2.8

db:BIDid:97138

Trust: 2.0

db:SECTRACKid:1038139

Trust: 1.1

db:JVNid:JVNVU90482935

Trust: 0.8

db:JVNDBid:JVNDB-2017-002411

Trust: 0.8

db:CNNVDid:CNNVD-201703-1293

Trust: 0.7

db:VULHUBid:VHN-110655

Trust: 0.1

sources: VULHUB: VHN-110655 // BID: 97138 // JVNDB: JVNDB-2017-002411 // CNNVD: CNNVD-201703-1293 // NVD: CVE-2017-2452

REFERENCES

url:http://www.securityfocus.com/bid/97138

Trust: 1.7

url:https://support.apple.com/ht207617

Trust: 1.7

url:http://www.securitytracker.com/id/1038139

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2452

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90482935/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2452

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/ios/

Trust: 0.3

sources: VULHUB: VHN-110655 // BID: 97138 // JVNDB: JVNDB-2017-002411 // CNNVD: CNNVD-201703-1293 // NVD: CVE-2017-2452

CREDITS

Anonymous researcher, Erling Ellingsen, Suprovici Vadim of UniApps team, Abhinav Bansal of Zscaler, Inc., Tuan Anh Ngo (Melbourne, Australia), Christoph Nehring, Richard Shupak, Ilya Nesterov and Maxim Goncharov, Suyash Narain of India, Hunter Byrnes,

Trust: 0.9

sources: BID: 97138 // CNNVD: CNNVD-201703-1293

SOURCES

db:VULHUBid:VHN-110655
db:BIDid:97138
db:JVNDBid:JVNDB-2017-002411
db:CNNVDid:CNNVD-201703-1293
db:NVDid:CVE-2017-2452

LAST UPDATE DATE

2024-11-23T19:32:50.753000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110655date:2017-07-12T00:00:00
db:BIDid:97138date:2017-03-29T01:02:00
db:JVNDBid:JVNDB-2017-002411date:2017-04-13T00:00:00
db:CNNVDid:CNNVD-201703-1293date:2017-03-29T00:00:00
db:NVDid:CVE-2017-2452date:2024-11-21T03:23:33.183

SOURCES RELEASE DATE

db:VULHUBid:VHN-110655date:2017-04-02T00:00:00
db:BIDid:97138date:2017-03-27T00:00:00
db:JVNDBid:JVNDB-2017-002411date:2017-04-13T00:00:00
db:CNNVDid:CNNVD-201703-1293date:2017-03-29T00:00:00
db:NVDid:CVE-2017-2452date:2017-04-02T01:59:02.637