ID

VAR-201002-0063


CVE

CVE-2010-0038


TITLE

Apple iPhone OS Vulnerable to reading arbitrary data in recovery mode

Trust: 0.8

sources: JVNDB: JVNDB-2010-001082

DESCRIPTION

Recovery Mode in Apple iPhone OS 1.0 through 3.1.2, and iPhone OS for iPod touch 1.1 through 3.1.2, allows physically proximate attackers to bypass device locking, and read or modify arbitrary data, via a USB control message that triggers memory corruption. Apple iPhone and iPod touch are prone to a security-bypass vulnerability affecting the Recovery Mode component. An attacker with physical access to a locked device can exploit this issue to bypass the passcode to access a user's data. This may aid in further attacks. Versions prior to iPhone OS 3.1.3 are affected

Trust: 1.98

sources: NVD: CVE-2010-0038 // JVNDB: JVNDB-2010-001082 // BID: 38040 // VULHUB: VHN-42643

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:iosscope:eqversion:1.0 to 3.1.2

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 3.1.2

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.1.3

Trust: 0.3

sources: BID: 38040 // JVNDB: JVNDB-2010-001082 // CNNVD: CNNVD-201002-016 // NVD: CVE-2010-0038

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0038
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0038
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201002-016
value: MEDIUM

Trust: 0.6

VULHUB: VHN-42643
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0038
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42643
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-42643 // JVNDB: JVNDB-2010-001082 // CNNVD: CNNVD-201002-016 // NVD: CVE-2010-0038

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-42643 // JVNDB: JVNDB-2010-001082 // NVD: CVE-2010-0038

THREAT TYPE

local

Trust: 0.9

sources: BID: 38040 // CNNVD: CNNVD-201002-016

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201002-016

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001082

PATCH

title:HT4013url:http://support.apple.com/kb/HT4013

Trust: 0.8

title:HT4013url:http://support.apple.com/kb/HT4013?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001082

EXTERNAL IDS

db:NVDid:CVE-2010-0038

Trust: 2.8

db:BIDid:38040

Trust: 2.8

db:OSVDBid:62128

Trust: 1.7

db:JVNDBid:JVNDB-2010-001082

Trust: 0.8

db:CNNVDid:CNNVD-201002-016

Trust: 0.7

db:VULHUBid:VHN-42643

Trust: 0.1

sources: VULHUB: VHN-42643 // BID: 38040 // JVNDB: JVNDB-2010-001082 // CNNVD: CNNVD-201002-016 // NVD: CVE-2010-0038

REFERENCES

url:http://www.securityfocus.com/bid/38040

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2010/feb/msg00000.html

Trust: 1.7

url:http://support.apple.com/kb/ht4013

Trust: 1.7

url:http://osvdb.org/62128

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0038

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0038

Trust: 0.8

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

sources: VULHUB: VHN-42643 // BID: 38040 // JVNDB: JVNDB-2010-001082 // CNNVD: CNNVD-201002-016 // NVD: CVE-2010-0038

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-201002-016

SOURCES

db:VULHUBid:VHN-42643
db:BIDid:38040
db:JVNDBid:JVNDB-2010-001082
db:CNNVDid:CNNVD-201002-016
db:NVDid:CVE-2010-0038

LAST UPDATE DATE

2025-04-11T23:17:58.990000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-42643date:2019-09-26T00:00:00
db:BIDid:38040date:2010-02-02T00:00:00
db:JVNDBid:JVNDB-2010-001082date:2010-02-24T00:00:00
db:CNNVDid:CNNVD-201002-016date:2019-09-27T00:00:00
db:NVDid:CVE-2010-0038date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-42643date:2010-02-03T00:00:00
db:BIDid:38040date:2010-02-02T00:00:00
db:JVNDBid:JVNDB-2010-001082date:2010-02-24T00:00:00
db:CNNVDid:CNNVD-201002-016date:2010-02-03T00:00:00
db:NVDid:CVE-2010-0038date:2010-02-03T19:30:00.437