Vulnerability Name:

CVE-2016-7637 (CCN-120172)

Assigned:2016-12-22
Published:2016-12-22
Updated:2018-10-30
Summary:An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2016-7637

Source: BID
Type: Third Party Advisory, VDB Entry
94905

Source: CCN
Type: BID-94905
Apple macOS/watchOS/iOS/tvOS Multiple Security Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1037469

Source: XF
Type: UNKNOWN
apple-macosx-cve20167637-priv-esc(120172)

Source: CCN
Type: Packet Storm Security [12-22-2016]
Mac OS / iOS Privileged Port Name Replacement

Source: CCN
Type: Apple security document HT207422
About the security content of iOS 10.2

Source: CCN
Type: Apple security document HT207423
About the security content of macOS Sierra 10.12.2, Security Update 2016-003 El Capitan, and Security Update 2016-007 Yosemite

Source: CCN
Type: Apple security document HT207425
About the security content of tvOS 10.1

Source: CCN
Type: Apple security document HT207487
About the security content of watchOS 3.1.3

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207422

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207423

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207487

Source: CCN
Type: Apple Web site
About the security content of macOS Sierra 10.12.2

Source: EXPLOIT-DB
Type: UNKNOWN
40931

Source: EXPLOIT-DB
Type: UNKNOWN
40957

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version <= 10.1.1)

  • Configuration 2:
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version <= 10.12.1)

  • Configuration 3:
  • cpe:/o:apple:watchos:*:*:*:*:*:*:*:* (Version <= 2.2.2)

  • * Denotes that component is vulnerable
    BACK
    apple iphone os *
    apple mac os x *
    apple watchos *