Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-09-18 03:55
Updated : 2017-08-28 18:34
NVD link : CVE-2014-4354
Mitre link : CVE-2014-4354
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
apple
- iphone_os