Risk | High |
Patch available | YES |
Number of vulnerabilities | 34 |
CVE-ID | CVE-2017-13890 CVE-2017-8816 CVE-2018-4104 CVE-2018-4105 CVE-2018-4106 CVE-2018-4107 CVE-2018-4108 CVE-2018-4111 CVE-2018-4112 CVE-2018-4115 CVE-2018-4131 CVE-2018-4132 CVE-2018-4135 CVE-2018-4136 CVE-2018-4138 CVE-2018-4139 CVE-2018-4142 CVE-2018-4143 CVE-2018-4144 CVE-2018-4150 CVE-2018-4151 CVE-2018-4152 CVE-2018-4154 CVE-2018-4155 CVE-2018-4156 CVE-2018-4157 CVE-2018-4158 CVE-2018-4160 CVE-2018-4166 CVE-2018-4167 CVE-2018-4170 CVE-2018-4174 CVE-2018-4175 CVE-2018-4176 |
CWE-ID | CWE-20 CWE-119 CWE-200 CWE-77 CWE-601 CWE-284 CWE-125 CWE-120 CWE-362 CWE-264 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #16 is available. Public exploit code for vulnerability #20 is available. |
Vulnerable software |
macOS Operating systems & Components / Operating system |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains information about 34 vulnerabilities.
EUVDB-ID: #VU11426
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-13890
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to an input validation flaw. A remote attacker can create specially crafted HTML that, when loaded by the target user, will exploit a logic error in the CoreTypes component and cause a disk image to be mounted on the target user's system.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9458
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-8816
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to buffer overflow in the NTLM authentication process. A remote unauthenticated attacker can use vectors involving long user and password fields, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11402
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4104
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to a input validation flaw in the the kernel component. A local attacker can run a specially crafted application and read restricted memory.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11423
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4105
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an APFS volume password may be unexpectedly truncated due to an input validation flaw. A remote attacker can send a specially crafted input and access arbitrary data.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11434
Risk: Low
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4106
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The weakness exists due to input validation flaw in the Terminal component. A remote attacker can use the Bracketed Paste Mode to inject and execute arbitrary commands.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11435
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4107
CWE-ID:
CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated attacker to redirect the target user to external websites.
The weakness exists due to improper validation of user-supplied input. A remote attacker can use a specially crafted image link, trick the victim into opening it and redirect users to malicious websites.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11424
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4108
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an APFS volume password may be unexpectedly truncated due to an input validation flaw. A remote attacker can send a specially crafted input and access arbitrary data.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11436
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4111
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote low-privileged attacker to obtain potentially sensitive information on the target system.
The weakness exists due to improper access control. A remote attacker can obtain the contents of S/MIME-encrypted e-mail.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11425
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4112
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an input validation flaw. A remote attacker can trick the victim into opening a specially crafted input, trigger a symlink handling bug in the ATS component and obtain potentially sensitive information.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11414
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4115
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to the system may use a configuration profile that has been removed. A remote attacker can bypass security restrictions.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11415
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4131
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to a state management flaw in the WindowServer component. A remote attacker can bypass security restrictions and log keystrokes entered into other applications when secure input mode is enabled.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11432
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4132
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the Intel Graphics Driver component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11433
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4135
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the IOFireWireFamily component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with kernel privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11437
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4136
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to out-of-bounds memory read error in the kernel. A local attacker can run a specially crafted application and cause the system to crash.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11441
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4138
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to input validation flaw in the NVIDIA Graphics Drivers component. A local attacker can run a specially crafted application and read restricted memory.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11439
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2018-4139
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the kext tools component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with system privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU11396
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-4142
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to boundary error in the CoreText component. A remote attacker can trigger memory corruption and cause the system to crash.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11388
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4143
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the kernel component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with kernel privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11408
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4144
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11387
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2018-4150
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the kernel component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with kernel privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU11400
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4151
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to race condition in the iCloud Drive component. A local attacker can run a specially crafted application and gain elevated privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11440
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4152
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to a race condition in the Notes component. A local attacker can run a specially crafted application, trigger memory corruption and gain system privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11407
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4154
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11394
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4155
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to race condition in the CoreFoundation component. A local attacker can run a specially crafted application and cause the system to crash.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11405
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4156
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to race condition in the PluginKit component. A local attacker can run a specially crafted application and gain elevated privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11406
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4157
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11395
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4158
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to race condition in the CoreFoundation component. A local attacker can run a specially crafted application and cause the system to crash.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11438
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4160
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to out-of-bounds memory read error in the kernel. A local attacker can run a specially crafted application and cause the system to crash.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11404
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4166
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to race condition in the NSURLSession component. A local attacker can run a specially crafted application and gain elevated privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11397
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4167
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to race condition in the File System Events component. A local attacker can run a specially crafted application and gain elevated privileges.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11422
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4170
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to unspecified flaw in Admin Framework. A local attacker can view passwords supplied to 'sysadminctl' via the command line.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11403
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4174
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote low-privileged attacker to obtain potentially sensitive information on the target system.
The weakness exists due to user interface flaw in the Mail component. A remote attacker can obtain the contents of S/MIME-encrypted e-mail.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11442
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4175
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass security restrictions on the target system.
The weakness exists due to a logic error in the LaunchServices component. A local attacker can run a specially crafted application and bypass code signing enforcement.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11427
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-4176
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to an input validation flaw. A remote attacker can create specially crafted image that, when loaded by the target user, will trigger a logic error in the Disk Images component to cause an application to launch on the target user's system.
Update to version 10.13.4.
Vulnerable software versionsmacOS: 10.3 7B85 - 10.13.3 17D47
CPE2.3 External linkshttps://support.apple.com/en-us/HT208692
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.