Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-4635 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Apple iOS Operating systems & Components / Operating system macOS Operating systems & Components / Operating system |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU1070
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-4635
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to disclose information.
The weakness exists due to improper processing of relayed call and allows attackers to cause audio transmission after call determination.
Successfull exploitation of the vulnerability results in disclosure of the valid user's personal information.
Update to version 10.1.
Vulnerable software versionsApple iOS: 9.0.0 - 10.0.1
macOS: 10.11 - 10.11.5
External linkshttp://support.apple.com/en-us/HT207271
http://support.apple.com/cs-cz/HT206903
http://support.apple.com/cs-cz/HT206902
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.