CVE-2008-4227
Published Nov 25, 2008
Last updated 2 years ago
Overview
- Description
- Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 changes the encryption level of PPTP VPN connections to a lower level than was previously used, which makes it easier for remote attackers to obtain sensitive information or hijack a connection by decrypting network traffic.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88FA2602-DDAB-4E23-A3D2-FB712970AAD1" }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41DB23F0-7226-4D0B-A3FA-A801F02EBA6B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4AEDE82-E317-4066-A34F-BB3BCD3F53E2" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455" } ], "operator": "OR" } ], "operator": "AND" } ]