Vulnerability Name: | CVE-2014-4440 (CCN-97628) | ||||||||
Assigned: | 2014-10-16 | ||||||||
Published: | 2014-10-16 | ||||||||
Updated: | 2017-08-29 | ||||||||
Summary: | The MCX Desktop Config Profiles implementation in Apple OS X before 10.10 retains web-proxy settings from uninstalled mobile-configuration profiles, which allows remote attackers to obtain sensitive information in opportunistic circumstances by leveraging access to an unintended proxy server. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N) 1.9 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-16 CWE-200 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: APPLE Type: Broken Link APPLE-SA-2014-10-16-1 Source: MITRE Type: CNA CVE-2014-4440 Source: CCN Type: Apple Web Site About the security content of OS X Yosemite v10.10 Source: BID Type: Third Party Advisory, VDB Entry 70631 Source: CCN Type: BID-70631 Apple Mac OS X CVE-2014-4440 Local Security Bypass Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1031063 Source: XF Type: UNKNOWN macosx-cve20144440-sec-bypass(97628) Source: XF Type: UNKNOWN macosx-cve20144440-sec-bypass(97628) Source: CONFIRM Type: Vendor Advisory https://support.apple.com/kb/HT6535 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |