Description
The remote host is running a version of macOS that is 10.13.x prior to 10.13.4. It is, therefore, affected by multiple vulnerabilities in the following components :
- Admin Framework
- APFS
- ATS
- CoreFoundation
- CoreText
- Disk Images
- Disk Management
- File System Events
- iCloud Drive
- Intel Graphics Driver
- IOFireWireFamily
- Kernel
- kext tools
- LaunchServices
- Mail
- Notes
- NSURLSession
- NVIDIA Graphics Drivers
- PDFKit
- PluginKit
- Quick Look
- Security
- Storage
- System Preferences
- Terminal
- WindowServer
Note that successful exploitation of the most serious issues can result in arbitrary code execution.
{"id": "700515.PRM", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "macOS 10.13.x < 10.13.4 Multiple Vulnerabilities", "description": "The remote host is running a version of macOS that is 10.13.x prior to 10.13.4. It is, therefore, affected by multiple vulnerabilities in the following components :\n\n - Admin Framework\n - APFS\n - ATS\n - CoreFoundation\n - CoreText\n - Disk Images\n - Disk Management\n - File System Events\n - iCloud Drive\n - Intel Graphics Driver\n - IOFireWireFamily\n - Kernel\n - kext tools\n - LaunchServices\n - Mail\n - Notes\n - NSURLSession\n - NVIDIA Graphics Drivers\n - PDFKit\n - PluginKit\n - Quick Look\n - Security\n - Storage\n - System Preferences\n - Terminal\n - WindowServer\n\nNote that successful exploitation of the most serious issues can result in arbitrary code execution.", "published": "2019-04-10T00:00:00", "modified": "2019-04-10T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/nnm/700515", "reporter": "Tenable", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4155", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4176", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4143", "https://support.apple.com/en-us/HT208692", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4132", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4142", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4152", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4175", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4136", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4115", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4160", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4166", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4151", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4174", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4106", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4167", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4139", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4105", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4144", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4157", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4111", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4154", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13890", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4138", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4135", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4158", "http://www.nessus.org/u?e0e00f71", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4107", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4131", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4112", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4104", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4170", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4108", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4150", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4156"], "cvelist": [], "immutableFields": [], "lastseen": "2023-05-24T14:09:59", "viewCount": 10, "enchantments": {"dependencies": {"references": []}, "score": {"value": 2.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS-2018-938"]}, {"type": "apple", "idList": ["APPLE:34416127035F64778C9F3F0EB9CDBC11", "APPLE:444B5944D49C1B1DB2F8D833473A3E28", "APPLE:6B41E03BE95C41152A91DE7584480E16", "APPLE:8C49A1E8A033BC61B2EB11E42BABEFC6", "APPLE:A906ED60E2875C343BE4CB7524339858", "APPLE:F5ED4B2C8BF2CB139C4753A54898E258", "APPLE:FAE8F6548DA345F4466BB73DD8BE2763", "APPLE:HT208465", "APPLE:HT208692", "APPLE:HT208693", "APPLE:HT208694", "APPLE:HT208696", "APPLE:HT208697", "APPLE:HT208698"]}, {"type": "archlinux", "idList": ["ASA-201711-36", "ASA-201711-37", "ASA-201711-38"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:B92BE0D66798E831F55CF2D88AA976E4"]}, {"type": "cve", "idList": ["CVE-2017-8816"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4051-1:99280"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-8816"]}, {"type": "exploitdb", "idList": ["EDB-ID:46248"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:2E83259D04E7C08ED83A449A0677A6B3"]}, {"type": "fedora", "idList": ["FEDORA:4813E602F5BE", "FEDORA:597806048158", "FEDORA:5C8E66094E72", "FEDORA:87D78601E81F"]}, {"type": "freebsd", "idList": ["301A01B7-D50E-11E7-AC58-B499BAEBFEAF"]}, {"type": "gentoo", "idList": ["GLSA-201712-04"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:37170621F78D33B9DDE68A73E0A16294"]}, {"type": "ibm", "idList": ["B05329785ED4441E67419C72F4E8D5EFB095312F0129B7DAC17DB1F2F0780EEC"]}, {"type": "kaspersky", "idList": ["KLA11281"]}, {"type": "myhack58", "idList": ["MYHACK58:62201891904"]}, {"type": "nessus", "idList": ["AL2_ALAS-2019-1162.NASL", "APPLETV_11_3.NASL", "DEBIAN_DSA-4051.NASL", "FEDORA_2017-0C062324CD.NASL", "FREEBSD_PKG_301A01B7D50E11E7AC58B499BAEBFEAF.NASL", "GENTOO_GLSA-201712-04.NASL", "MACOS_10_13_3.NASL", "PHOTONOS_PHSA-2018-1_0-0108_CURL.NASL", "PHOTONOS_PHSA-2018-2_0-0016_CURL.NASL", "SLACKWARE_SSA_2017-333-03.NASL", "UBUNTU_USN-3498-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704051", "OPENVAS:1361412562310843384", "OPENVAS:1361412562310873888", "OPENVAS:1361412562310873891"]}, {"type": "photon", "idList": ["PHSA-2018-1.0-0108", "PHSA-2018-2.0-0016"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-14618"]}, {"type": "slackware", "idList": ["SSA-2017-333-03"]}, {"type": "thn", "idList": ["THN:42FDB723458E15A8414E25ED68F2EA47"]}, {"type": "ubuntu", "idList": ["USN-3498-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2017-8816"]}, {"type": "zdt", "idList": ["1337DAY-ID-30278"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2017-13890", "epss": 0.00258, "percentile": 0.62062, "modified": "2023-05-07"}, {"cve": "CVE-2017-8816", "epss": 0.04709, "percentile": 0.91412, "modified": "2023-05-07"}, {"cve": "CVE-2018-4104", "epss": 0.00114, "percentile": 0.43718, "modified": "2023-05-07"}, {"cve": "CVE-2018-4105", "epss": 0.01121, "percentile": 0.82499, "modified": "2023-05-07"}, {"cve": "CVE-2018-4106", "epss": 0.01043, "percentile": 0.81774, "modified": "2023-05-07"}, {"cve": "CVE-2018-4107", "epss": 0.00226, "percentile": 0.59359, "modified": "2023-05-07"}, {"cve": "CVE-2018-4108", "epss": 0.01121, "percentile": 0.82499, "modified": "2023-05-07"}, {"cve": "CVE-2018-4111", "epss": 0.00247, "percentile": 0.6118, "modified": "2023-05-07"}, {"cve": "CVE-2018-4112", "epss": 0.00091, "percentile": 0.37755, "modified": "2023-05-07"}, {"cve": "CVE-2018-4115", "epss": 0.00891, "percentile": 0.80288, "modified": "2023-05-07"}, {"cve": "CVE-2018-4131", "epss": 0.00167, "percentile": 0.51994, "modified": "2023-05-07"}, {"cve": "CVE-2018-4132", "epss": 0.00143, "percentile": 0.48707, "modified": "2023-05-07"}, {"cve": "CVE-2018-4135", "epss": 0.00143, "percentile": 0.48707, "modified": "2023-05-07"}, {"cve": "CVE-2018-4136", "epss": 0.00143, "percentile": 0.48707, "modified": "2023-05-07"}, {"cve": "CVE-2018-4138", "epss": 0.00081, "percentile": 0.331, "modified": "2023-05-07"}, {"cve": "CVE-2018-4139", "epss": 0.00246, "percentile": 0.6105, "modified": "2023-05-07"}, {"cve": "CVE-2018-4142", "epss": 0.02015, "percentile": 0.87163, "modified": "2023-05-07"}, {"cve": "CVE-2018-4143", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4144", "epss": 0.00196, "percentile": 0.5601, "modified": "2023-05-07"}, {"cve": "CVE-2018-4150", "epss": 0.00248, "percentile": 0.61241, "modified": "2023-05-07"}, {"cve": "CVE-2018-4151", "epss": 0.00194, "percentile": 0.5572, "modified": "2023-05-07"}, {"cve": "CVE-2018-4152", "epss": 0.00143, "percentile": 0.48707, "modified": "2023-05-07"}, {"cve": "CVE-2018-4154", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4155", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4156", "epss": 0.00194, "percentile": 0.5572, "modified": "2023-05-07"}, {"cve": "CVE-2018-4157", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4158", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4160", "epss": 0.00143, "percentile": 0.48707, "modified": "2023-05-07"}, {"cve": "CVE-2018-4166", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4167", "epss": 0.00206, "percentile": 0.57048, "modified": "2023-05-07"}, {"cve": "CVE-2018-4170", "epss": 0.00043, "percentile": 0.07804, "modified": "2023-05-07"}, {"cve": "CVE-2018-4174", "epss": 0.0031, "percentile": 0.65523, "modified": "2023-05-07"}, {"cve": "CVE-2018-4175", "epss": 0.00122, "percentile": 0.45172, "modified": "2023-05-07"}, {"cve": "CVE-2018-4176", "epss": 0.00103, "percentile": 0.40654, "modified": "2023-05-07"}], "vulnersScore": 2.3}, "_state": {"dependencies": 1685064693, "score": 1685065376, "epss": 0}, "_internal": {"score_hash": "d58a6bec3eca2bc0b2eabffd0ec181af"}, "pluginID": "700515", "sourceData": "Binary data 700515.prm", "naslFamily": "Operating System Detection", "cpe": ["cpe:/o:apple:mac_os_x"], "solution": "Upgrade to macOS version 10.13.4 or later.", "nessusSeverity": "Critical", "cvssScoreSource": "", "vendor_cvss2": {"score": 10, "vector": "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "vendor_cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": "2018-03-29T00:00:00", "vulnerabilityPublicationDate": "2018-03-29T00:00:00", "exploitableWith": []}
{}