Vulnerability identifier: #VU15913
Vulnerability risk: Low
CVSSv3.1: 2.4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Apple iOS
Operating systems & Components /
Operating system
Vendor: Apple Inc.
Description
The vulnerability allows a physical attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an error in JIT in the web browser followed by an out-of-bounds access. A physical attacker can gain out-of-bounds read and write for sandbox escape and escalation and exfiltrate data from the device.
Mitigation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.
Vulnerable software versions
Apple iOS: 12.1 16B92
External links
http://www.zerodayinitiative.com/blog/2018/11/13/pwn2own-tokyo-2018-day-one-results
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.