ID

VAR-201410-1082


CVE

CVE-2014-4448


TITLE

Apple iOS of House Arrest Vulnerability in which important information can be obtained from the document directory

Trust: 0.8

sources: JVNDB: JVNDB-2014-004901

DESCRIPTION

House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID. Successfully exploiting this issue may allow attackers to view encrypted data and obtain sensitive information. This may lead to other attacks. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. House Arrest is one of the services used for calling iTunes to send and receive files between iOS devices and Apps. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-10-20-1 iOS 8.1 iOS 8.1 is now available and addresses the following: Bluetooth Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious Bluetooth input device may bypass pairing Description: Unencrypted connections were permitted from Human Interface Device-class Bluetooth Low Energy accessories. If an iOS device had paired with such an accessory, an attacker could spoof the legitimate accessory to establish a connection. The issue was addressed by denying unencrypted HID connections. CVE-ID CVE-2014-4428 : Mike Ryan of iSEC Partners House Arrest Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Files transferred to the device may be written with insufficient cryptographic protection Description: Files could be transferred to an app's Documents directory and encrypted with a key protected only by the hardware UID. This issue was addressed by encrypting the transferred files with a key protected by the hardware UID and the user's passcode. CVE-ID CVE-2014-4448 : Jonathan Zdziarski and Kevin DeLong iCloud Data Access Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker in a privileged network position may force iCloud data access clients to leak sensitive information Description: A TLS certificate validation vulnerability existed in iCloud data access clients. This issue was addressed by improved certificate validation. CVE-ID CVE-2014-4449 : Carl Mehner of USAA Keyboards Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: QuickType could learn users' credentials Description: QuickType could learn users' credentials when switching between elements. This issue was addressed by QuickType not learning from fields where autocomplete is disabled and reapplying the criteria when switching between DOM input elements in legacy WebKit. CVE-ID CVE-2014-4450 Secure Transport Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 when a cipher suite uses a block cipher in CBC mode. An attacker could force the use of SSL 3.0, even when the server would support a better TLS version, by blocking TLS 1.0 and higher connection attempts. This issue was addressed by disabling CBC cipher suites when TLS connection attempts fail. CVE-ID CVE-2014-3566 : Bodo Moeller, Thai Duong, and Krzysztof Kotowicz of Google Security Team Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "8.1". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJURUHQAAoJEBcWfLTuOo7tJMoP/2RPUJpecEmfPnrJHesyWE07 eGVLvu+Qo/VQN2X/aJI4ZxXiZzzEhbo9+HOEmE9hfBW+GwJ+tumOqJ/S0+8X6/BT 955fHTKT8zPHa1OvW2H+CEdeYtxIVTCb14ePmZMfykiyhvvk5HeODKPrj2fO7yL/ Bb9vggEkgZvssrXNQ3SXWLbzTobivaOjGNPXgELUFfCjjZH7Sdf9l8/r+NGR4c4w YFeDFqfPq9U7ebBt14oH5a+t3ha5uV0Zt1aKFtRkFdJlIwHFMbb7QSUQY1W24Kvt MKqpWQi1fR2x1k6p5ss6o8S/EeL5Vz6KsPnraWTRayC8w5r6IhVeOLbAEoaI0yON YoyY9LkFOwx68BZr8q7MyFdN+5iHrlYFG9bfSzIeZ1NmK4cfMgaG+jckoh/GtNjm voDOHL7qEjDgpAoYZ7XejVKvd5v7xXV8JcnDtmlg+rCh1eH/vyoYX4+PFUW3AiIo IkgUm0JvaZrOdXP1W2vIqFDHaxGoUMj4Ius+No7X+e4+uDACofBYP8btEdBf2mEW NBqc2jLZRaXbCpaHK1TCfeqSQLh32pUVWsgsK9ad4uH79tMke2EzyYkwztiksxT3 f4s8MGv2PdYnLjfWc4C5WN8ZbgdILVncTdNUItYvVya1nyuSXkCK6thWS35YEvDp ViMxSLY5YjSJvhzCf+hk =5AaA -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2014-4448 // JVNDB: JVNDB-2014-004901 // BID: 70661 // VULHUB: VHN-72388 // PACKETSTORM: 128769

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:lteversion:8.0.2

Trust: 1.0

vendor:applemodel:iosscope:ltversion:8.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.1 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.1 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:8.0.2

Trust: 0.6

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

sources: BID: 70661 // JVNDB: JVNDB-2014-004901 // CNNVD: CNNVD-201410-1164 // NVD: CVE-2014-4448

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-4448
value: LOW

Trust: 1.0

NVD: CVE-2014-4448
value: LOW

Trust: 0.8

CNNVD: CNNVD-201410-1164
value: LOW

Trust: 0.6

VULHUB: VHN-72388
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-4448
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-72388
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-72388 // JVNDB: JVNDB-2014-004901 // CNNVD: CNNVD-201410-1164 // NVD: CVE-2014-4448

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-72388 // JVNDB: JVNDB-2014-004901 // NVD: CVE-2014-4448

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201410-1164

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201410-1164

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004901

PATCH

title:HT6541url:http://support.apple.com/kb/HT6541

Trust: 0.8

title:HT6541url:http://support.apple.com/kb/HT6541?viewlocale=ja_JP

Trust: 0.8

title:iPhone7,2_8.1_12B411_Restoreurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=52149

Trust: 0.6

sources: JVNDB: JVNDB-2014-004901 // CNNVD: CNNVD-201410-1164

EXTERNAL IDS

db:NVDid:CVE-2014-4448

Trust: 2.9

db:BIDid:70661

Trust: 1.4

db:SECTRACKid:1031077

Trust: 1.1

db:JVNDBid:JVNDB-2014-004901

Trust: 0.8

db:CNNVDid:CNNVD-201410-1164

Trust: 0.7

db:VULHUBid:VHN-72388

Trust: 0.1

db:PACKETSTORMid:128769

Trust: 0.1

sources: VULHUB: VHN-72388 // BID: 70661 // JVNDB: JVNDB-2014-004901 // PACKETSTORM: 128769 // CNNVD: CNNVD-201410-1164 // NVD: CVE-2014-4448

REFERENCES

url:http://www.securityfocus.com/archive/1/533747

Trust: 2.5

url:https://support.apple.com/kb/ht6541

Trust: 1.7

url:http://www.securityfocus.com/bid/70661

Trust: 1.1

url:http://www.securitytracker.com/id/1031077

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/97664

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4448

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4448

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-4449

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4450

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4448

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4428

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

sources: VULHUB: VHN-72388 // BID: 70661 // JVNDB: JVNDB-2014-004901 // PACKETSTORM: 128769 // CNNVD: CNNVD-201410-1164 // NVD: CVE-2014-4448

CREDITS

Jonathan Zdziarski, and Kevin DeLong.

Trust: 0.3

sources: BID: 70661

SOURCES

db:VULHUBid:VHN-72388
db:BIDid:70661
db:JVNDBid:JVNDB-2014-004901
db:PACKETSTORMid:128769
db:CNNVDid:CNNVD-201410-1164
db:NVDid:CVE-2014-4448

LAST UPDATE DATE

2025-04-13T22:05:40.781000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-72388date:2017-08-29T00:00:00
db:BIDid:70661date:2014-10-20T00:00:00
db:JVNDBid:JVNDB-2014-004901date:2014-10-23T00:00:00
db:CNNVDid:CNNVD-201410-1164date:2014-10-23T00:00:00
db:NVDid:CVE-2014-4448date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-72388date:2014-10-22T00:00:00
db:BIDid:70661date:2014-10-20T00:00:00
db:JVNDBid:JVNDB-2014-004901date:2014-10-23T00:00:00
db:PACKETSTORMid:128769date:2014-10-21T01:06:53
db:CNNVDid:CNNVD-201410-1164date:2014-10-23T00:00:00
db:NVDid:CVE-2014-4448date:2014-10-22T10:55:02.607