Total vulnerabilities in the database
The 802.1X subsystem in Apple iOS before 8 and Apple TV before 7 does not require strong authentication methods, which allows remote attackers to calculate credentials by offering LEAP authentication from a crafted Wi-Fi AP and then performing a cryptographic attack against the MS-CHAPv1 hash.
Software | From | Fixed in |
---|---|---|
apple / iphone_os | 7.0.4 | 7.0.4.x |
apple / iphone_os | 7.1.1 | 7.1.1.x |
apple / iphone_os | - | 7.1.2.x |
apple / iphone_os | 7.0.5 | 7.0.5.x |
apple / iphone_os | 7.1 | 7.1.x |
apple / iphone_os | 7.0.6 | 7.0.6.x |
apple / iphone_os | 7.0.1 | 7.0.1.x |
apple / iphone_os | 7.0.2 | 7.0.2.x |
apple / iphone_os | 7.0 | 7.0.x |
apple / iphone_os | 7.0.3 | 7.0.3.x |
apple / tvos | 6.0 | 6.0.x |
apple / tvos | 6.0.1 | 6.0.1.x |
apple / tvos | 6.0.2 | 6.0.2.x |
apple / tvos | 6.1 | 6.1.x |
apple / tvos | 6.1.1 | 6.1.1.x |
apple / tvos | 6.1.2 | 6.1.2.x |
apple / tvos | - | 6.2.x |