Vulnerability Name:

CVE-2013-4616

Assigned:2013-06-18
Published:2013-06-18
Updated:2013-10-25
Summary:The WifiPasswordController generateDefaultPassword method in Preferences in Apple iOS 6 and earlier relies on the UITextChecker suggestWordInLanguage method for selection of Wi-Fi hotspot WPA2 PSK passphrases, which makes it easier for remote attackers to obtain access via a brute-force attack that leverages the insufficient number of possible passphrases.
CVSS v3 Severity:6.3 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P)
4.7 Medium (Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-255
(ALLOWS_USER_ACCESS)
References:Source: APPLE
Type: VENDOR_ADVISORY
APPLE-SA-2013-09-18-2

Source: MLIST
Type: UNKNOWN
[owasp-mobile-security-project] 20130617 Cracking iOS personal hotspots using a Scrabble crossword game word list

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT5934

Source: SECTRACK
Type: UNKNOWN
1029054

Source: MISC
Type: UNKNOWN
http://www1.cs.fau.de/filepool/projects/hotspot/hotspot.pdf

Source: MISC
Type: UNKNOWN
http://www1.cs.fau.de/hotspot

Source: XF
Type: UNKNOWN
appleios-cve20134616-unauth-access(85111)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.0:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    apple iphone_os 5.1.1
    apple iphone_os 5.1
    apple iphone_os 5.0.1
    apple iphone_os 5.0
    apple iphone_os 4.3.5
    apple iphone_os 4.3.3
    apple iphone_os 4.3.2
    apple iphone_os 4.3.1
    apple iphone_os 4.3.0
    apple iphone_os 4.2.8
    apple iphone_os 4.2.5
    apple iphone_os 4.2.1
    apple iphone_os 4.1
    apple iphone_os 4.0.2
    apple iphone_os 4.0.1
    apple iphone_os 4.0
    apple iphone_os 3.2.2
    apple iphone_os 3.2.1
    apple iphone_os 3.2
    apple iphone_os 3.1.3
    apple iphone_os 3.1.2
    apple iphone_os 3.1
    apple iphone_os 3.0.1
    apple iphone_os 3.0
    apple iphone_os 2.2.1
    apple iphone_os 2.2
    apple iphone_os 2.1.1
    apple iphone_os 2.1
    apple iphone_os 2.0.2
    apple iphone_os 2.0.1
    apple iphone_os 2.0.0
    apple iphone_os 2.0
    apple iphone_os 1.1.5
    apple iphone_os 1.1.4
    apple iphone_os 1.1.3
    apple iphone_os 1.1.2
    apple iphone_os 1.1.1
    apple iphone_os 1.1.0
    apple iphone_os 1.0.2
    apple iphone_os 1.0.1
    apple iphone_os 1.0.0
    apple iphone_os 6.0