Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apple
Published: 2014-09-18T10:00:00
Updated: 2024-08-06T11:12:35.120Z
Reserved: 2014-06-20T00:00:00
Link: CVE-2014-4354
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-09-18T10:55:08.627
Modified: 2017-08-29T01:34:57.563
Link: CVE-2014-4354
Redhat
No data.