Vulnerability Name:

CVE-2013-5149

Assigned:2013-08-15
Published:2013-09-19
Updated:2013-10-25
Summary:The Push Notifications subsystem in Apple iOS before 7 provides the push-notification token to an app without user approval, which allows attackers to obtain sensitive information via an app that employs a crafted push-notification registration process.
CVSS v3 Severity:3.7 Low (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-264
References:Source: APPLE
Type: VENDOR_ADVISORY
APPLE-SA-2013-09-18-2

Source: CONFIRM
Type: VENDOR_ADVISORY
http://support.apple.com/kb/HT5934

Source: SECTRACK
Type: UNKNOWN
1029054

Source: XF
Type: UNKNOWN
apple-pushnotifications-cve20135149(87240)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    apple iphone_os 6.1.4
    apple iphone_os 1.0.0
    apple iphone_os 1.0.1
    apple iphone_os 1.0.2
    apple iphone_os 1.1.0
    apple iphone_os 1.1.1
    apple iphone_os 1.1.2
    apple iphone_os 1.1.3
    apple iphone_os 1.1.4
    apple iphone_os 1.1.5
    apple iphone_os 2.0
    apple iphone_os 2.0.0
    apple iphone_os 2.0.1
    apple iphone_os 2.0.2
    apple iphone_os 2.1
    apple iphone_os 2.1.1
    apple iphone_os 2.2
    apple iphone_os 2.2.1
    apple iphone_os 3.0
    apple iphone_os 3.0.1
    apple iphone_os 3.1
    apple iphone_os 3.1.2
    apple iphone_os 3.1.3
    apple iphone_os 3.2
    apple iphone_os 3.2.1
    apple iphone_os 3.2.2
    apple iphone_os 4.0
    apple iphone_os 4.0.1
    apple iphone_os 4.0.2
    apple iphone_os 4.1
    apple iphone_os 4.2.1
    apple iphone_os 4.2.5
    apple iphone_os 4.2.8
    apple iphone_os 4.3.0
    apple iphone_os 4.3.1
    apple iphone_os 4.3.2
    apple iphone_os 4.3.3
    apple iphone_os 4.3.5
    apple iphone_os 5.0
    apple iphone_os 5.0.1
    apple iphone_os 5.1
    apple iphone_os 5.1.1
    apple iphone_os 6.0
    apple iphone_os 6.0.1
    apple iphone_os 6.0.2
    apple iphone_os 6.1
    apple iphone_os 6.1.2
    apple iphone_os 6.1.3