Severity
7.4HIGHNVD
EPSS
17.9%
top 4.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 22
Latest updateMay 2

Description

The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange.c in the Secure Transport feature in the Data Security component in Apple iOS 6.x before 6.1.6 and 7.x before 7.0.6, Apple TV 6.x before 6.0.2, and Apple OS X 10.9.x before 10.9.2 does not check the signature in a TLS Server Key Exchange message, which allows man-in-the-middle attackers to spoof SSL servers by (1) using an arbitrary private key for the signing step or (2) omitting the signing step.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.2

Affected Packages3 packages

NVDapple/tvos6.06.0.2
NVDapple/mac_os_x10.910.9.2
NVDapple/iphone_os6.06.1.6+1

🔴Vulnerability Details

1
GHSA
GHSA-4j69-27g2-fgcw: The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange2022-05-14

📋Vendor Advisories

1
Red Hat
kernel: mptcp: fix UaF in listener shutdown2025-05-02

📐Framework References

10
CWE
Dead Code
CWE
Channel Accessible by Non-Endpoint
CWE
Irrelevant Code
CWE
Incorrect Control Flow Scoping
CWE
Incorrect Block Delimitation