Security restrictions bypass in Apple iOS - CVE-2018-4086
Published: January 24, 2018
Vulnerability identifier: #VU10213
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-4086
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Apple Inc.
Affected software:
Apple iOS
Apple iOS
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to improper certificate evaluation issue in the handling of name constraints. A remote attacker can bypass security restrictions and cause the Security component to incorrectly apply certificate name constraints.
The weakness exists due to improper certificate evaluation issue in the handling of name constraints. A remote attacker can bypass security restrictions and cause the Security component to incorrectly apply certificate name constraints.
How to mitigate CVE-2018-4086
Update to version 11.2.5.