CVE-2019-6235
moderate-risk
Published 2019-03-04
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3, iTunes 12.9.3 for Windows. A sandboxed process may be able to circumvent sandbox restrictions.
Do I need to act?
-
0.77% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (12)
Third Party Advisory
http://www.securityfocus.com/bid/106724
Vendor Advisory
https://support.apple.com/HT209443
Vendor Advisory
https://support.apple.com/HT209446
Vendor Advisory
https://support.apple.com/HT209447
Vendor Advisory
https://support.apple.com/HT209448
Vendor Advisory
https://support.apple.com/HT209450
Third Party Advisory
http://www.securityfocus.com/bid/106724
Vendor Advisory
https://support.apple.com/HT209443
Vendor Advisory
https://support.apple.com/HT209446
Vendor Advisory
https://support.apple.com/HT209447
Vendor Advisory
https://support.apple.com/HT209448
Vendor Advisory
https://support.apple.com/HT209450
48
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
3/34 · Minimal
Exposure
12/34 · Low