CVE-2017-7150
low-risk
Published 2017-10-23
An issue was discovered in certain Apple products. macOS before 10.13 Supplemental Update is affected. The issue involves the "Security" component. It allows attackers to bypass the keychain access prompt, and consequently extract passwords, via a synthetic click.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/101177
Third Party Advisory
http://www.securitytracker.com/id/1039430
Vendor Advisory
https://support.apple.com/HT208165
Third Party Advisory
http://www.securityfocus.com/bid/101177
Third Party Advisory
http://www.securitytracker.com/id/1039430
Vendor Advisory
https://support.apple.com/HT208165
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal