Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-7289 CVE-2019-7290 |
CWE-ID | CWE-22 CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Shortcuts for iOS Client/Desktop applications / Software for system administration |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU17438
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-7289
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to an error in Shortcuts during improper handling of directory paths. A local attacker can conduct directory traversal attack and view sensitive user information.
MitigationUpdate to version 2.1.3.
Vulnerable software versionsShortcuts for iOS: 2.1.2
CPE2.3 External linkshttps://support.apple.com/en-us/HT209522
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17439
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-7290
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass security restrictions on the target system.
The vulnerability exists due to improper sandboxed process in Shortcuts. A local attacker can circumvent sandbox restrictions.
MitigationUpdate to version 2.1.3.
Vulnerable software versionsShortcuts for iOS: 2.1.2
CPE2.3 External linkshttps://support.apple.com/en-us/HT209522
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.