CVE-2008-3612
moderate-risk
Published 2008-09-11
The Networking subsystem in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, uses predictable TCP initial sequence numbers, which allows remote attackers to spoof or hijack a TCP connection.
Do I need to act?
~
2.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (20)
Broken Link
http://secunia.com/advisories/31823
Broken Link
http://secunia.com/advisories/31900
Vendor Advisory
http://support.apple.com/kb/HT3026
Vendor Advisory
http://support.apple.com/kb/HT3129
Broken Link
http://www.securityfocus.com/bid/31092
Broken Link
http://www.securitytracker.com/id?1020848
Broken Link
http://secunia.com/advisories/31823
Broken Link
http://secunia.com/advisories/31900
Vendor Advisory
http://support.apple.com/kb/HT3026
Vendor Advisory
http://support.apple.com/kb/HT3129
Broken Link
http://www.securityfocus.com/bid/31092
Broken Link
http://www.securitytracker.com/id?1020848
43
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
5/34 · Minimal