Vulnerability Name:

CVE-2013-4616 (CCN-85111)

Assigned:2013-06-17
Published:2013-06-17
Updated:2013-10-25
Summary:The WifiPasswordController generateDefaultPassword method in Preferences in Apple iOS 6 and earlier relies on the UITextChecker suggestWordInLanguage method for selection of Wi-Fi hotspot WPA2 PSK passphrases, which makes it easier for remote attackers to obtain access via a brute-force attack that leverages the insufficient number of possible passphrases.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P)
4.7 Medium (Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-255
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2013-4616

Source: APPLE
Type: Vendor Advisory
APPLE-SA-2013-09-18-2

Source: CCN
Type: Owasp Web site
Cracking iOS personal hotspots using a Scrabble crossword game word list

Source: MLIST
Type: UNKNOWN
[owasp-mobile-security-project] 20130617 Cracking iOS personal hotspots using a Scrabble crossword game word list

Source: CCN
Type: SA54886
Apple iOS Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
54886

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT5934

Source: CCN
Type: Apple Web site
Apple

Source: CCN
Type: BID-60616
Apple iOS CVE-2013-4616 Insecure Default WPA2 Password Generation Weakness

Source: SECTRACK
Type: UNKNOWN
1029054

Source: MISC
Type: UNKNOWN
http://www1.cs.fau.de/filepool/projects/hotspot/hotspot.pdf

Source: MISC
Type: UNKNOWN
http://www1.cs.fau.de/hotspot

Source: XF
Type: UNKNOWN
appleios-cve20134616-unauth-access(85111)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:4.3.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:ios:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version <= 6.0)

  • * Denotes that component is vulnerable
    BACK
    apple iphone os 1.0.0
    apple iphone os 1.0.1
    apple iphone os 1.0.2
    apple iphone os 1.1.0
    apple iphone os 1.1.1
    apple iphone os 1.1.2
    apple iphone os 1.1.3
    apple iphone os 1.1.4
    apple iphone os 1.1.5
    apple iphone os 2.0
    apple iphone os 2.0.0
    apple iphone os 2.0.1
    apple iphone os 2.0.2
    apple iphone os 2.1
    apple iphone os 2.1.1
    apple iphone os 2.2
    apple iphone os 2.2.1
    apple iphone os 3.0
    apple iphone os 3.0.1
    apple iphone os 3.1
    apple iphone os 3.1.2
    apple iphone os 3.1.3
    apple iphone os 3.2
    apple iphone os 3.2.1
    apple iphone os 3.2.2
    apple iphone os 4.0
    apple iphone os 4.0.1
    apple iphone os 4.0.2
    apple iphone os 4.1
    apple iphone os 4.2.1
    apple iphone os 4.2.5
    apple iphone os 4.2.8
    apple iphone os 4.3.0
    apple iphone os 4.3.1
    apple iphone os 4.3.2
    apple iphone os 4.3.3
    apple iphone os 4.3.5
    apple iphone os 5.0
    apple iphone os 5.0.1
    apple iphone os 5.1
    apple iphone os 5.1.1
    apple iphone os *