Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Iphone_os | Apple | * | 7.1.2 (including) |
Iphone_os | Apple | 7.0 (including) | 7.0 (including) |
Iphone_os | Apple | 7.0.1 (including) | 7.0.1 (including) |
Iphone_os | Apple | 7.0.2 (including) | 7.0.2 (including) |
Iphone_os | Apple | 7.0.3 (including) | 7.0.3 (including) |
Iphone_os | Apple | 7.0.4 (including) | 7.0.4 (including) |
Iphone_os | Apple | 7.0.5 (including) | 7.0.5 (including) |
Iphone_os | Apple | 7.0.6 (including) | 7.0.6 (including) |
Iphone_os | Apple | 7.1 (including) | 7.1 (including) |
Iphone_os | Apple | 7.1.1 (including) | 7.1.1 (including) |