Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Iphone_os | Apple | 7.0.4 | 7.0.4 |
Iphone_os | Apple | 7.1.1 | 7.1.1 |
Iphone_os | Apple | * | 7.1.2 |
Iphone_os | Apple | 7.0.5 | 7.0.5 |
Iphone_os | Apple | 7.1 | 7.1 |
Iphone_os | Apple | 7.0.6 | 7.0.6 |
Iphone_os | Apple | 7.0.1 | 7.0.1 |
Iphone_os | Apple | 7.0.2 | 7.0.2 |
Iphone_os | Apple | 7.0 | 7.0 |
Iphone_os | Apple | 7.0.3 | 7.0.3 |