漏洞标题
N/A
漏洞描述信息
在某些 Apple 设备的 SecureROM 中存在一处漏洞,该漏洞可被未认证的本地攻击者利用,在启动设备时执行任意代码。此漏洞允许在设备上执行任意代码。利用该漏洞需要物理访问设备:设备必须在启动时连接到计算机,并且必须进入设备固件更新(DFU)模式。该漏洞利用不具备持久性;重启设备将覆盖在被利用会话期间对设备软件所做的任何更改。此外,除非攻击者拥有设备的解锁 PIN 码或指纹,否则攻击者无法访问受 Apple 安全隔离区(Secure Enclave)或触控 ID(Touch ID)功能保护的信息。
CVSS信息
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
认证机制不恰当
漏洞标题
N/A
漏洞描述信息
A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulnerability requires physical access to the device: the device must be plugged in to a computer upon booting, and it must be put into Device Firmware Update (DFU) mode. The exploit is not persistent; rebooting the device overrides any changes to the device's software that were made during an exploited session on the device. Additionally, unless an attacker has access to the device's unlock PIN or fingerprint, an attacker cannot gain access to information protected by Apple's Secure Enclave or Touch ID features.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
SecureROM 安全漏洞
漏洞描述信息
SecureROM是一款用于解密、转储固件密钥的工具。 SecureROM中存在安全漏洞。在启用设备时,本地攻击者可利用该漏洞执行任意代码。以下产品及版本受到影响:Apple Ipad Mini 2;Apple Ipad Mini 3;Apple Ipod Touch 5;Apple Ipod Touch 6;Apple Ipod Touch 7;Apple TV(第三代);Apple TV 4K generation;Apple Watch Series 1;Apple Watch Series 2;A
CVSS信息
N/A
漏洞类别
其他