#VU26447 Cleartext transmission of sensitive information in Apple iOS and iPadOS


Published: 2020-03-27

Vulnerability identifier: #VU26447

Vulnerability risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-9770

CWE-ID: CWE-319

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Apple iOS
Operating systems & Components / Operating system
iPadOS
Operating systems & Components / Operating system

Vendor: Apple Inc.

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote authenticated attacker on the local network with ability to intercept Bluetooth traffic can gain access to sensitive data.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Apple iOS: 13.3 17C54 - 13.3.1 17D50, 13.2.2 17B102 - 13.2.3 17B111, 13.1.1 17A854 - 13.1.3 17A878

iPadOS: 13.3 - 13.3.1, 13.2 - 13.2.3, 13.1.1 - 13.1.3


External links
http://seclists.org/fulldisclosure/2020/Mar/28
http://support.apple.com/en-hk/HT211102


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability