CVE-2010-1775
Published Jun 22, 2010
Last updated 2 years ago
Overview
- Description
- Race condition in Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch allows physically proximate attackers to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot.
- Source
- product-security@apple.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 1.9
- Impact score
- 2.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-362
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "593E5E7E-9606-430E-851A-4AE2D35423AD", "versionEndIncluding": "3.2" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4AEDE82-E317-4066-A34F-BB3BCD3F53E2" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC16D1C-065A-4D1A-BA6E-528A71DF65CC" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75" }, { "criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF40CDA4-4716-4815-9ED0-093FE266734C" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0" }, { "criteria": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440" }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "863383DA-0BC6-4A96-835A-A96128EC0202" }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F" }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A20F171-79FE-43B9-8309-B18341639FA1" }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "126EF22D-29BC-4366-97BC-B261311E6251" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88FA2602-DDAB-4E23-A3D2-FB712970AAD1" }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917" } ], "operator": "OR" } ], "operator": "AND" } ]