Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-13855Incorrect Type Conversion or Cast in Apple Iphone OS

Severity
5.5MEDIUMNVD
EPSS
6.2%
top 9.07%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 25
Latest updateMay 14

Description

An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app that triggers type confusion.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages8 packages

NVDapple/tvos< 11.2
NVDapple/watchos< 4.2
NVDapple/mac_os_x< 10.13.2
Appleapple/tvos11.2
Appleapple/watchos4.2

🔴Vulnerability Details

1
GHSA
GHSA-jwvc-gc5c-g22h: An issue was discovered in certain Apple products2022-05-14

💥Exploits & PoCs

1
Exploit-DB
Apple macOS - 'necp_get_socket_attributes' so_pcb Type Confusion2017-12-11

📋Vendor Advisories

4
Apple
CVE-2017-13855: macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan2017-12-06
Apple
CVE-2017-13855: watchOS 4.22017-12-05
Apple
CVE-2017-13855: tvOS 11.22017-12-04
Apple
CVE-2017-13855: iOS 11.22017-12-02