Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/69943 | vdb entry |
http://support.apple.com/kb/HT6441 | |
http://www.securitytracker.com/id/1030866 | vdb entry |
http://www.securityfocus.com/bid/69882 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96089 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html | vendor advisory |