Lucene search

K
cve[email protected]CVE-2013-0980
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2013-0980

2022-10-0316:15:04
CWE-264
web.nvd.nist.gov
30
apple
ios
passcode lock
bypass
security vulnerability

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

5.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

The Passcode Lock implementation in Apple iOS before 6.1.3 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging an error in the emergency-call feature.

Affected configurations

NVD
Node
appleiphone_osRange6.1.2
OR
appleiphone_osMatch1.0.0
OR
appleiphone_osMatch1.0.1
OR
appleiphone_osMatch1.0.2
OR
appleiphone_osMatch1.1.0
OR
appleiphone_osMatch1.1.0-ipodtouch
OR
appleiphone_osMatch1.1.1
OR
appleiphone_osMatch1.1.2
OR
appleiphone_osMatch1.1.2-ipodtouch
OR
appleiphone_osMatch1.1.3
OR
appleiphone_osMatch1.1.3-ipodtouch
OR
appleiphone_osMatch1.1.4
OR
appleiphone_osMatch1.1.4-ipodtouch
OR
appleiphone_osMatch1.1.5
OR
appleiphone_osMatch1.1.5-ipodtouch
OR
appleiphone_osMatch2.0
OR
appleiphone_osMatch2.0.0
OR
appleiphone_osMatch2.0.0-ipodtouch
OR
appleiphone_osMatch2.0.1
OR
appleiphone_osMatch2.0.1-ipodtouch
OR
appleiphone_osMatch2.0.2
OR
appleiphone_osMatch2.0.2-ipodtouch
OR
appleiphone_osMatch2.1
OR
appleiphone_osMatch2.1-ipodtouch
OR
appleiphone_osMatch2.1.1
OR
appleiphone_osMatch2.2
OR
appleiphone_osMatch2.2-ipodtouch
OR
appleiphone_osMatch2.2.1
OR
appleiphone_osMatch2.2.1-ipodtouch
OR
appleiphone_osMatch3.0
OR
appleiphone_osMatch3.0-ipodtouch
OR
appleiphone_osMatch3.0.1
OR
appleiphone_osMatch3.0.1-ipodtouch
OR
appleiphone_osMatch3.1
OR
appleiphone_osMatch3.1-ipodtouch
OR
appleiphone_osMatch3.1.2
OR
appleiphone_osMatch3.1.2-ipodtouch
OR
appleiphone_osMatch3.1.3
OR
appleiphone_osMatch3.1.3-ipodtouch
OR
appleiphone_osMatch3.2
OR
appleiphone_osMatch3.2-ipodtouch
OR
appleiphone_osMatch3.2.1
OR
appleiphone_osMatch3.2.1-ipad
OR
appleiphone_osMatch3.2.2
OR
appleiphone_osMatch4.0
OR
appleiphone_osMatch4.0-ipodtouch
OR
appleiphone_osMatch4.0.1
OR
appleiphone_osMatch4.0.1-ipodtouch
OR
appleiphone_osMatch4.0.2
OR
appleiphone_osMatch4.1
OR
appleiphone_osMatch4.2.1
OR
appleiphone_osMatch4.2.5
OR
appleiphone_osMatch4.2.8
OR
appleiphone_osMatch4.3.0
OR
appleiphone_osMatch4.3.1
OR
appleiphone_osMatch4.3.2
OR
appleiphone_osMatch4.3.3
OR
appleiphone_osMatch4.3.5
OR
appleiphone_osMatch4.3.5-ipad
OR
appleiphone_osMatch4.3.5-ipodtouch
OR
appleiphone_osMatch5.0
OR
appleiphone_osMatch5.0-ipad
OR
appleiphone_osMatch5.0-ipodtouch
OR
appleiphone_osMatch5.0.1
OR
appleiphone_osMatch5.0.1-ipad
OR
appleiphone_osMatch5.0.1-ipodtouch
OR
appleiphone_osMatch5.1
OR
appleiphone_osMatch5.1.1
OR
appleiphone_osMatch6.0
OR
appleiphone_osMatch6.0.1
OR
appleiphone_osMatch6.0.2
OR
appleiphone_osMatch6.1

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

5.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%