ID

VAR-201707-1160


CVE

CVE-2017-7058


TITLE

Apple iOS of Notifications Vulnerability to read unintentional notification of lock screen in component

Trust: 0.8

sources: JVNDB: JVNDB-2017-005714

DESCRIPTION

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. The issue involves the "Notifications" component. It allows physically proximate attackers to read unintended notifications on the lock screen. Apple iOS is prone to multiple security vulnerabilities. Successful exploits will allow attackers to perform unauthorized actions, execute arbitrary code in the context of the affected device or cause denial-of-service conditions; other attacks may also be possible. Apple iOS is an operating system developed by Apple (Apple) for mobile devices

Trust: 1.98

sources: NVD: CVE-2017-7058 // JVNDB: JVNDB-2017-005714 // BID: 99891 // VULHUB: VHN-115261

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:lteversion:10.3.2

Trust: 1.0

vendor:applemodel:iosscope:ltversion:10.3.3 (ipad first 4 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10.3.3 (iphone 5 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10.3.3 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:10.3.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:50

Trust: 0.3

vendor:applemodel:iosscope:eqversion:40

Trust: 0.3

vendor:applemodel:iosscope:eqversion:30

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10

Trust: 0.3

vendor:applemodel:iosscope:neversion:10.3.3

Trust: 0.3

sources: BID: 99891 // JVNDB: JVNDB-2017-005714 // CNNVD: CNNVD-201707-953 // NVD: CVE-2017-7058

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7058
value: LOW

Trust: 1.0

NVD: CVE-2017-7058
value: LOW

Trust: 0.8

CNNVD: CNNVD-201707-953
value: LOW

Trust: 0.6

VULHUB: VHN-115261
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-7058
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115261
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7058
baseSeverity: LOW
baseScore: 2.4
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.9
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115261 // JVNDB: JVNDB-2017-005714 // CNNVD: CNNVD-201707-953 // NVD: CVE-2017-7058

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-115261 // JVNDB: JVNDB-2017-005714 // NVD: CVE-2017-7058

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201707-953

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201707-953

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005714

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT207923url:https://support.apple.com/en-us/HT207923

Trust: 0.8

title:HT207923url:https://support.apple.com/ja-jp/HT207923

Trust: 0.8

title:Apple iOS Notifications Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71895

Trust: 0.6

sources: JVNDB: JVNDB-2017-005714 // CNNVD: CNNVD-201707-953

EXTERNAL IDS

db:NVDid:CVE-2017-7058

Trust: 2.8

db:BIDid:99891

Trust: 1.4

db:SECTRACKid:1038950

Trust: 1.1

db:JVNid:JVNVU91410779

Trust: 0.8

db:JVNDBid:JVNDB-2017-005714

Trust: 0.8

db:CNNVDid:CNNVD-201707-953

Trust: 0.7

db:VULHUBid:VHN-115261

Trust: 0.1

sources: VULHUB: VHN-115261 // BID: 99891 // JVNDB: JVNDB-2017-005714 // CNNVD: CNNVD-201707-953 // NVD: CVE-2017-7058

REFERENCES

url:https://support.apple.com/ht207923

Trust: 1.7

url:http://www.securityfocus.com/bid/99891

Trust: 1.1

url:http://www.securitytracker.com/id/1038950

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7058

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91410779/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7058

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/ios/

Trust: 0.3

sources: VULHUB: VHN-115261 // BID: 99891 // JVNDB: JVNDB-2017-005714 // CNNVD: CNNVD-201707-953 // NVD: CVE-2017-7058

CREDITS

xisigr of Tencent's Xuanwu Lab, José Antonio Esteban of Sapsi Consultores, and an anonymous researcher.

Trust: 0.3

sources: BID: 99891

SOURCES

db:VULHUBid:VHN-115261
db:BIDid:99891
db:JVNDBid:JVNDB-2017-005714
db:CNNVDid:CNNVD-201707-953
db:NVDid:CVE-2017-7058

LAST UPDATE DATE

2025-04-20T20:50:05.936000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115261date:2017-07-24T00:00:00
db:BIDid:99891date:2017-07-19T00:00:00
db:JVNDBid:JVNDB-2017-005714date:2017-08-04T00:00:00
db:CNNVDid:CNNVD-201707-953date:2017-07-27T00:00:00
db:NVDid:CVE-2017-7058date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-115261date:2017-07-20T00:00:00
db:BIDid:99891date:2017-07-19T00:00:00
db:JVNDBid:JVNDB-2017-005714date:2017-08-04T00:00:00
db:CNNVDid:CNNVD-201707-953date:2017-07-27T00:00:00
db:NVDid:CVE-2017-7058date:2017-07-20T16:29:02.253