Vulnerability Name: | CVE-2015-3692 (CCN-104193) | ||||||||
Assigned: | 2015-06-30 | ||||||||
Published: | 2015-06-30 | ||||||||
Updated: | 2016-12-06 | ||||||||
Summary: | Apple Mac EFI before 2015-001, as used in OS X before 10.10.4 and other products, does not enforce a locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging root privileges. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C) 5.0 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-284 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-3692 Source: APPLE Type: Patch, Vendor Advisory APPLE-SA-2015-06-30-2 Source: APPLE Type: Vendor Advisory APPLE-SA-2015-06-30-3 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/kb/HT204934 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/kb/HT204942 Source: BID Type: UNKNOWN 75495 Source: CCN Type: BID-75495 Apple Mac OS X Prior to 10.10.4 Multiple Security Vulnerabilities Source: SECTRACK Type: UNKNOWN 1032444 Source: XF Type: UNKNOWN macosx-cve20153692-sec-bypass(104193) Source: CCN Type: Apple Web site About the security content of OS X Yosemite v10.10.4 and Security Update 2015-005 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |