ID

VAR-201712-1105


CVE

CVE-2017-7162


TITLE

plural Apple Product IOKit Component vulnerable to arbitrary code execution in privileged context

Trust: 0.8

sources: JVNDB: JVNDB-2017-011454

DESCRIPTION

An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "IOKit" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple iOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the backboardd service. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code under the context of root. Apple iOS/WatchOS/tvOS/macOS are prone to a memory-corruption vulnerability. Failed exploit attempts will result in a denial-of-service condition. Apple iOS, macOS High Sierra, tvOS, and watchOS are all products of Apple Inc. in the United States. Apple iOS is an operating system developed for mobile devices; macOS High Sierra is a dedicated operating system developed for Mac computers; tvOS is a smart TV operating system. watchOS is a smart watch operating system. IOKit is one of the components that read system information. The following products and versions are affected: Apple iOS prior to 11.2; macOS High Sierra prior to 10.13.2; tvOS prior to 11.2; watchOS prior to 4.2

Trust: 3.24

sources: NVD: CVE-2017-7162 // JVNDB: JVNDB-2017-011454 // ZDI: ZDI-18-149 // ZDI: ZDI-18-154 // BID: 103135 // VULHUB: VHN-115365

AFFECTED PRODUCTS

vendor:applemodel:iosscope: - version: -

Trust: 1.4

vendor:applemodel:tvosscope:ltversion:11.2

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:11.2

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.13.2

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:4.2

Trust: 1.0

vendor:applemodel:watchosscope:eqversion:3.1.3

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:3.1.1

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:2.2.2

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:2.2.1

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:2.0.1

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:3.2

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:3.1

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:3.0

Trust: 0.9

vendor:applemodel:watchosscope:eqversion:2.2

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:10.11.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.13.1

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2 (ipad air or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2 (iphone 5s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:11.2 (apple tv 4k)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:11.2 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:4.2 (apple watch all models )

Trust: 0.8

vendor:applemodel:watchosscope:eqversion:2.2.0

Trust: 0.6

vendor:applemodel:watchosscope:eqversion:10.1.1

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:4

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:3

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.1.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10

Trust: 0.3

vendor:applemodel:tvscope:eqversion:0

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.6

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.5

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.4

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.3

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.2

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipad airscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:50

Trust: 0.3

vendor:applemodel:iosscope:eqversion:40

Trust: 0.3

vendor:applemodel:iosscope:eqversion:30

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10

Trust: 0.3

vendor:applemodel:watchosscope:neversion:4.2

Trust: 0.3

vendor:applemodel:tvosscope:neversion:11.2

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.13.2

Trust: 0.3

vendor:applemodel:iosscope:neversion:11.2

Trust: 0.3

sources: ZDI: ZDI-18-149 // ZDI: ZDI-18-154 // BID: 103135 // JVNDB: JVNDB-2017-011454 // CNNVD: CNNVD-201703-830 // NVD: CVE-2017-7162

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2017-7162
value: MEDIUM

Trust: 1.4

nvd@nist.gov: CVE-2017-7162
value: HIGH

Trust: 1.0

NVD: CVE-2017-7162
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201703-830
value: HIGH

Trust: 0.6

VULHUB: VHN-115365
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-7162
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2017-7162
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.4

VULHUB: VHN-115365
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7162
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-18-149 // ZDI: ZDI-18-154 // VULHUB: VHN-115365 // JVNDB: JVNDB-2017-011454 // CNNVD: CNNVD-201703-830 // NVD: CVE-2017-7162

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-115365 // JVNDB: JVNDB-2017-011454 // NVD: CVE-2017-7162

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201703-830

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201703-830

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011454

PATCH

title:HT208334url:https://support.apple.com/en-us/HT208334

Trust: 2.2

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208331url:https://support.apple.com/en-us/HT208331

Trust: 0.8

title:HT208325url:https://support.apple.com/en-us/HT208325

Trust: 0.8

title:HT208327url:https://support.apple.com/en-us/HT208327

Trust: 0.8

title:HT208325url:https://support.apple.com/ja-jp/HT208325

Trust: 0.8

title:HT208327url:https://support.apple.com/ja-jp/HT208327

Trust: 0.8

title:HT208331url:https://support.apple.com/ja-jp/HT208331

Trust: 0.8

title:HT208334url:https://support.apple.com/ja-jp/HT208334

Trust: 0.8

title:Multiple Apple product IOKit Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90626

Trust: 0.6

sources: ZDI: ZDI-18-149 // ZDI: ZDI-18-154 // JVNDB: JVNDB-2017-011454 // CNNVD: CNNVD-201703-830

EXTERNAL IDS

db:NVDid:CVE-2017-7162

Trust: 4.2

db:JVNid:JVNVU98418454

Trust: 0.8

db:JVNDBid:JVNDB-2017-011454

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-5343

Trust: 0.7

db:ZDIid:ZDI-18-149

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-5354

Trust: 0.7

db:ZDIid:ZDI-18-154

Trust: 0.7

db:CNNVDid:CNNVD-201703-830

Trust: 0.7

db:BIDid:103135

Trust: 0.4

db:VULHUBid:VHN-115365

Trust: 0.1

sources: ZDI: ZDI-18-149 // ZDI: ZDI-18-154 // VULHUB: VHN-115365 // BID: 103135 // JVNDB: JVNDB-2017-011454 // CNNVD: CNNVD-201703-830 // NVD: CVE-2017-7162

REFERENCES

url:https://support.apple.com/en-us/ht208334

Trust: 1.7

url:https://support.apple.com/ht208325

Trust: 1.7

url:https://support.apple.com/ht208327

Trust: 1.7

url:https://support.apple.com/ht208331

Trust: 1.7

url:https://support.apple.com/ht208334

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7162

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98418454/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7162

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/ios/

Trust: 0.3

url:https://support.apple.com/en-in/ht208334

Trust: 0.3

url:https://support.apple.com/en-in/ht208331

Trust: 0.3

url:https://support.apple.com/en-in/ht208327

Trust: 0.3

url:https://support.apple.com/en-in/ht208325

Trust: 0.3

sources: ZDI: ZDI-18-149 // ZDI: ZDI-18-154 // VULHUB: VHN-115365 // BID: 103135 // JVNDB: JVNDB-2017-011454 // CNNVD: CNNVD-201703-830 // NVD: CVE-2017-7162

CREDITS

Tencent Keen Security Lab

Trust: 0.7

sources: ZDI: ZDI-18-149

SOURCES

db:ZDIid:ZDI-18-149
db:ZDIid:ZDI-18-154
db:VULHUBid:VHN-115365
db:BIDid:103135
db:JVNDBid:JVNDB-2017-011454
db:CNNVDid:CNNVD-201703-830
db:NVDid:CVE-2017-7162

LAST UPDATE DATE

2025-04-20T21:22:52.254000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-149date:2018-02-07T00:00:00
db:ZDIid:ZDI-18-154date:2018-02-07T00:00:00
db:VULHUBid:VHN-115365date:2019-03-08T00:00:00
db:BIDid:103135date:2018-01-10T00:00:00
db:JVNDBid:JVNDB-2017-011454date:2018-01-17T00:00:00
db:CNNVDid:CNNVD-201703-830date:2019-03-13T00:00:00
db:NVDid:CVE-2017-7162date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:ZDIid:ZDI-18-149date:2018-02-07T00:00:00
db:ZDIid:ZDI-18-154date:2018-02-07T00:00:00
db:VULHUBid:VHN-115365date:2017-12-27T00:00:00
db:BIDid:103135date:2018-01-10T00:00:00
db:JVNDBid:JVNDB-2017-011454date:2018-01-17T00:00:00
db:CNNVDid:CNNVD-201703-830date:2017-03-20T00:00:00
db:NVDid:CVE-2017-7162date:2017-12-27T17:08:24.547