ID

VAR-201507-0422


CVE

CVE-2015-3728


TITLE

Apple iOS Wireless LAN Vulnerabilities that automatically trigger association with any security type in the connection function

Trust: 0.8

sources: JVNDB: JVNDB-2015-003435

DESCRIPTION

The WiFi Connectivity feature in Apple iOS before 8.4 allows remote Wi-Fi access points to trigger an automatic association, with an arbitrary security type, by operating with a recognized ESSID within an 802.11 network's coverage area. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. Apple iOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, perform unauthorized actions, bypass security restrictions, and perform other attacks. Versions prior to iOS 8.4 are vulnerable. Apple iOS is an operating system developed by Apple (Apple) for mobile devices

Trust: 1.98

sources: NVD: CVE-2015-3728 // JVNDB: JVNDB-2015-003435 // BID: 75490 // VULHUB: VHN-81689

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:applemodel:iosscope:ltversion:8.4 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.4 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.4 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:8.3

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

sources: BID: 75490 // JVNDB: JVNDB-2015-003435 // CNNVD: CNNVD-201507-089 // NVD: CVE-2015-3728

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3728
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-3728
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201507-089
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81689
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3728
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-81689
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-81689 // JVNDB: JVNDB-2015-003435 // CNNVD: CNNVD-201507-089 // NVD: CVE-2015-3728

PROBLEMTYPE DATA

problemtype:CWE-254

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-81689 // JVNDB: JVNDB-2015-003435 // NVD: CVE-2015-3728

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201507-089

TYPE

Unknown

Trust: 0.3

sources: BID: 75490

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003435

PATCH

title:APPLE-SA-2015-06-30-1 iOS 8.4url:http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html

Trust: 0.8

title:HT204941url:http://support.apple.com/en-us/HT204941

Trust: 0.8

title:HT204941url:http://support.apple.com/ja-jp/HT204941

Trust: 0.8

sources: JVNDB: JVNDB-2015-003435

EXTERNAL IDS

db:NVDid:CVE-2015-3728

Trust: 2.8

db:BIDid:75490

Trust: 1.4

db:SECTRACKid:1032761

Trust: 1.1

db:JVNDBid:JVNDB-2015-003435

Trust: 0.8

db:CNNVDid:CNNVD-201507-089

Trust: 0.7

db:VULHUBid:VHN-81689

Trust: 0.1

sources: VULHUB: VHN-81689 // BID: 75490 // JVNDB: JVNDB-2015-003435 // CNNVD: CNNVD-201507-089 // NVD: CVE-2015-3728

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.7

url:http://support.apple.com/kb/ht204941

Trust: 1.7

url:http://www.securityfocus.com/bid/75490

Trust: 1.1

url:http://www.securitytracker.com/id/1032761

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3728

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3728

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/ipad/

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

sources: VULHUB: VHN-81689 // BID: 75490 // JVNDB: JVNDB-2015-003435 // CNNVD: CNNVD-201507-089 // NVD: CVE-2015-3728

CREDITS

Zhaofeng Chen, Hui Xue, and Tao (Lenx) Wei from FireEye, Inc, chaithanya (SegFault) working with HP's Zero Day Initiative, WanderingGlitch of HP's Zero Day Initiative, Matt Spisak of Endgame and Brian W. Gray of Carnegie Mellon University, Craig Young from

Trust: 0.3

sources: BID: 75490

SOURCES

db:VULHUBid:VHN-81689
db:BIDid:75490
db:JVNDBid:JVNDB-2015-003435
db:CNNVDid:CNNVD-201507-089
db:NVDid:CVE-2015-3728

LAST UPDATE DATE

2025-04-13T21:34:27.051000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81689date:2016-12-28T00:00:00
db:BIDid:75490date:2015-07-15T00:52:00
db:JVNDBid:JVNDB-2015-003435date:2015-07-09T00:00:00
db:CNNVDid:CNNVD-201507-089date:2015-07-03T00:00:00
db:NVDid:CVE-2015-3728date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81689date:2015-07-03T00:00:00
db:BIDid:75490date:2015-06-30T00:00:00
db:JVNDBid:JVNDB-2015-003435date:2015-07-09T00:00:00
db:CNNVDid:CNNVD-201507-089date:2015-07-03T00:00:00
db:NVDid:CVE-2015-3728date:2015-07-03T02:00:18.773