Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Iphone_os | Apple | * | 7.1.2 (including) |
Iphone_os | Apple | 7.0 (including) | 7.0 (including) |
Iphone_os | Apple | 7.0.1 (including) | 7.0.1 (including) |
Iphone_os | Apple | 7.0.2 (including) | 7.0.2 (including) |
Iphone_os | Apple | 7.0.3 (including) | 7.0.3 (including) |
Iphone_os | Apple | 7.0.4 (including) | 7.0.4 (including) |
Iphone_os | Apple | 7.0.5 (including) | 7.0.5 (including) |
Iphone_os | Apple | 7.0.6 (including) | 7.0.6 (including) |
Iphone_os | Apple | 7.1 (including) | 7.1 (including) |
Iphone_os | Apple | 7.1.1 (including) | 7.1.1 (including) |