CVE-2008-4229
Published Nov 25, 2008
Last updated 2 years ago
Overview
- Description
- Race condition in the Passcode Lock feature in Apple iPhone OS 2.0 through 2.1 and iPhone OS for iPod touch 2.0 through 2.1 allows physically proximate attackers to remove the lock and launch arbitrary applications by restoring the device from a backup.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.7
- Impact score
- 6.4
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-362
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88FA2602-DDAB-4E23-A3D2-FB712970AAD1" }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41DB23F0-7226-4D0B-A3FA-A801F02EBA6B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4AEDE82-E317-4066-A34F-BB3BCD3F53E2" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455" } ], "operator": "OR" } ], "operator": "AND" } ]