CVE-2016-4583
low-risk
Published 2016-07-22
WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to bypass the Same Origin Policy and obtain image date from an unintended web site via a timing attack involving an SVG document.
Do I need to act?
-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (2)
References (20)
Third Party Advisory
http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Dis...
Third Party Advisory
http://www.securityfocus.com/archive/1/539295/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/91830
Third Party Advisory
http://www.securitytracker.com/id/1036343
Vendor Advisory
https://support.apple.com/HT206900
Vendor Advisory
https://support.apple.com/HT206902
Vendor Advisory
https://support.apple.com/HT206905
Third Party Advisory
http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Dis...
Third Party Advisory
http://www.securityfocus.com/archive/1/539295/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/91830
Third Party Advisory
http://www.securitytracker.com/id/1036343
Vendor Advisory
https://support.apple.com/HT206900
Vendor Advisory
https://support.apple.com/HT206902
Vendor Advisory
https://support.apple.com/HT206905
19
/ 100
low-risk
Severity
11/34 · Low
Exploitability
1/34 · Minimal
Exposure
7/34 · Low