ID

VAR-201712-0276


CVE

CVE-2017-13903


TITLE

Apple iOS and tvOS of HomeKit Vulnerability in changing the state of applications in components

Trust: 0.8

sources: JVNDB: JVNDB-2017-011427

DESCRIPTION

An issue was discovered in certain Apple products. iOS before 11.2.1 is affected. tvOS before 11.2.1 is affected. The issue involves the "HomeKit" component. It allows remote attackers to modify the application state by leveraging incorrect message handling, as demonstrated by use of an Apple Watch to obtain an encryption key and unlock a door. of the United States. The former is a set of operating systems developed for mobile devices; the latter is a set of smart TV operating systems. HomeKit is one of the smart home platform components. Security bypass bypass exists in AppleKit versions prior to iOS 11.2.1 and HomeKit components in versions prior to tvOS 11.2.1. Successfully exploiting this issue will allow attackers to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-12-13-1 iOS 11.2.1 iOS 11.2.1 is now available and addresses the following: HomeKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to unexpectedly alter application state Description: A message handling issue was addressed with improved input validation. CVE-2017-13903: Tian Zhang Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "11.2.1". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAloxbW0pHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEaQMw/7 B8AJYxkCRVbT+E+UD3bcbK/TnG/xCLEE/GLzJwRrTUWiqoedjI5UUAivKO4C/Jro nTqPCU1+VRNKJKWno6qsscYOoCezuLVU4aI6eQejj9WlmHrnjBBEfPjnxDYnGNfo 1d/hLcWtozteLtbFc/CQVa2zmsgn6jrbVWSL6rqX1jnwtDBLcm18bh9xga8j7drC +HjhmvCzdndJczPA2ezwnm/8381LGt87XQ2b2nQNu5qqIb43oU/dyxIihusgD2lK In3BylVApHyKoWnvtgsmuBvzPYNiGwLQOuXwSkrZEB26jyWJQT3ppsaZvdCvQGVa KOS5EjHmb1DnL7wll+OKNml9XKQ/qqSovcC1dfrUSXt4FgOVPTwUqSVHai3I+Dyk gVDsjsBojjbok/cLGd7zL+UeOLAjWRjCN4d7T/dSXudXtWhOatg+DeO/mvDtooLl b6+ay9UdG+Lqb7Ql6M03ajtdxg1aUkvZv6eNkrpVO8PrSadngEmPcnCOvJ/Q4XNz 9loq6CyVTpLQKcrwKFW6ouyjHPO95lYy8PGqMhkICz8WAyTSpNj7DC5B7wMQL+b0 zJfX1rgJjOW80gOn3YHrbDtKrK09LelFnFZd9J5hmN58uhtS/uYcStwoOzRLl9SZ xH7ulIi3W7rfXwyORO6M5ush9JHcoIl61UAGPADvp0k= =rlI9 -----END PGP SIGNATURE-----

Trust: 2.7

sources: NVD: CVE-2017-13903 // JVNDB: JVNDB-2017-011427 // CNVD: CNVD-2017-37284 // BID: 102182 // VULHUB: VHN-104572 // PACKETSTORM: 145428 // PACKETSTORM: 145427

AFFECTED PRODUCTS

vendor:applemodel:tvosscope:ltversion:11.2.1

Trust: 1.6

vendor:applemodel:iphone osscope:ltversion:11.2.1

Trust: 1.0

vendor:applemodel:iosscope:ltversion:11.2.1 (ipad air or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2.1 (iphone 5s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2.1 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:11.2.1 (apple tv 4k)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:11.2.1 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.0.3

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.0.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.0.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.3.3

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.3.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.0

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.1.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.3.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:11.1.2

Trust: 0.6

vendor:applemodel:tvosscope:eqversion:10.1.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.1.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipad airscope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:50

Trust: 0.3

vendor:applemodel:iosscope:eqversion:40

Trust: 0.3

vendor:applemodel:iosscope:eqversion:30

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvosscope:neversion:11.2.1

Trust: 0.3

vendor:applemodel:iosscope:neversion:11.2.1

Trust: 0.3

sources: CNVD: CNVD-2017-37284 // BID: 102182 // JVNDB: JVNDB-2017-011427 // CNNVD: CNNVD-201712-592 // NVD: CVE-2017-13903

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-13903
value: HIGH

Trust: 1.0

NVD: CVE-2017-13903
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-37284
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201712-592
value: HIGH

Trust: 0.6

VULHUB: VHN-104572
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-13903
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-37284
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-104572
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-13903
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-37284 // VULHUB: VHN-104572 // JVNDB: JVNDB-2017-011427 // CNNVD: CNNVD-201712-592 // NVD: CVE-2017-13903

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-371

Trust: 0.9

sources: VULHUB: VHN-104572 // JVNDB: JVNDB-2017-011427 // NVD: CVE-2017-13903

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-592

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201712-592

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011427

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208357url:https://support.apple.com/en-us/HT208357

Trust: 0.8

title:HT208359url:https://support.apple.com/en-us/HT208359

Trust: 0.8

title:HT208357url:https://support.apple.com/ja-jp/HT208357

Trust: 0.8

title:HT208359url:https://support.apple.com/ja-jp/HT208359

Trust: 0.8

title:Patch for Apple iOS and tvOS HomeKit Security Bypass Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/110813

Trust: 0.6

title:Apple iOS and tvOS HomeKit Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77150

Trust: 0.6

sources: CNVD: CNVD-2017-37284 // JVNDB: JVNDB-2017-011427 // CNNVD: CNNVD-201712-592

EXTERNAL IDS

db:NVDid:CVE-2017-13903

Trust: 3.6

db:BIDid:102182

Trust: 2.6

db:SECTRACKid:1040008

Trust: 1.7

db:JVNid:JVNVU98418454

Trust: 0.8

db:JVNDBid:JVNDB-2017-011427

Trust: 0.8

db:CNNVDid:CNNVD-201712-592

Trust: 0.7

db:CNVDid:CNVD-2017-37284

Trust: 0.6

db:PACKETSTORMid:145428

Trust: 0.2

db:PACKETSTORMid:145427

Trust: 0.2

db:VULHUBid:VHN-104572

Trust: 0.1

sources: CNVD: CNVD-2017-37284 // VULHUB: VHN-104572 // BID: 102182 // JVNDB: JVNDB-2017-011427 // PACKETSTORM: 145428 // PACKETSTORM: 145427 // CNNVD: CNNVD-201712-592 // NVD: CVE-2017-13903

REFERENCES

url:http://www.securityfocus.com/bid/102182

Trust: 2.9

url:https://support.apple.com/ht208357

Trust: 1.7

url:https://support.apple.com/ht208359

Trust: 1.7

url:https://www.engadget.com/2017/12/21/apple-ignored-a-major-homekit-security-flaw-for-six-weeks/

Trust: 1.7

url:http://www.securitytracker.com/id/1040008

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-13903

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13903

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98418454/index.html

Trust: 0.8

url:http://seclists.org/fulldisclosure/2017/dec/51

Trust: 0.6

url:https://www.apple.com/

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2017/dec/msg00003.html

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2017/dec/msg00004.html

Trust: 0.3

url:https://support.apple.com/en-in/ht208357

Trust: 0.3

url:https://support.apple.com/en-in/ht208359

Trust: 0.3

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://www.apple.com/itunes/

Trust: 0.1

sources: CNVD: CNVD-2017-37284 // VULHUB: VHN-104572 // BID: 102182 // JVNDB: JVNDB-2017-011427 // PACKETSTORM: 145428 // PACKETSTORM: 145427 // CNNVD: CNNVD-201712-592 // NVD: CVE-2017-13903

CREDITS

Tian Zhang

Trust: 0.9

sources: BID: 102182 // CNNVD: CNNVD-201712-592

SOURCES

db:CNVDid:CNVD-2017-37284
db:VULHUBid:VHN-104572
db:BIDid:102182
db:JVNDBid:JVNDB-2017-011427
db:PACKETSTORMid:145428
db:PACKETSTORMid:145427
db:CNNVDid:CNNVD-201712-592
db:NVDid:CVE-2017-13903

LAST UPDATE DATE

2025-04-20T21:49:00.258000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-37284date:2017-12-18T00:00:00
db:VULHUBid:VHN-104572date:2019-10-03T00:00:00
db:BIDid:102182date:2017-12-19T22:01:00
db:JVNDBid:JVNDB-2017-011427date:2018-01-16T00:00:00
db:CNNVDid:CNNVD-201712-592date:2019-10-23T00:00:00
db:NVDid:CVE-2017-13903date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-37284date:2017-12-18T00:00:00
db:VULHUBid:VHN-104572date:2017-12-25T00:00:00
db:BIDid:102182date:2017-12-13T00:00:00
db:JVNDBid:JVNDB-2017-011427date:2018-01-16T00:00:00
db:PACKETSTORMid:145428date:2017-12-15T02:22:22
db:PACKETSTORMid:145427date:2017-12-15T01:11:11
db:CNNVDid:CNNVD-201712-592date:2017-12-15T00:00:00
db:NVDid:CVE-2017-13903date:2017-12-25T21:29:15.230