Vulnerability Description
The DNAv4 protocol implementation in the DHCP component in Apple iOS before 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote attackers to obtain sensitive information about previous device locations by sniffing an unencrypted Wi-Fi network for these packets.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Iphone Os | <= 5.1.1 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.htmlVendor Advisory
- http://support.apple.com/kb/HT5503Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78720
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.htmlVendor Advisory
- http://support.apple.com/kb/HT5503Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78720
FAQ
What is CVE-2012-3725?
CVE-2012-3725 is a vulnerability with a CVSS score of 3.3 (LOW). The DNAv4 protocol implementation in the DHCP component in Apple iOS before 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote attackers to...
How severe is CVE-2012-3725?
CVE-2012-3725 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3725?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Iphone Os.