3.3
CVSSv2

CVE-2012-3725

Published: 20/09/2012 Updated: 29/08/2017
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
VMScore: 295
Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The DNAv4 protocol implementation in the DHCP component in Apple iOS prior to 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote malicious users to obtain sensitive information about previous device locations by sniffing an unencrypted Wi-Fi network for these packets.

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os 1.1.0

apple iphone os 1.1.1

apple iphone os 1.1.2

apple iphone os 2.0.2

apple iphone os 2.1

apple iphone os 3.1.2

apple iphone os 3.1.3

apple iphone os 4.1

apple iphone os 4.2.1

apple iphone os 4.2.5

apple iphone os 5.0

apple iphone os 5.0.1

apple iphone os 1.0.0

apple iphone os 1.1.5

apple iphone os 2.0

apple iphone os 2.2.1

apple iphone os 3.0

apple iphone os 3.2.2

apple iphone os 4.0

apple iphone os 4.3.1

apple iphone os 4.3.2

apple iphone os 1.1.3

apple iphone os 1.1.4

apple iphone os 2.1.1

apple iphone os 2.2

apple iphone os 3.2

apple iphone os 3.2.1

apple iphone os 4.2.8

apple iphone os 4.3.0

apple iphone os

apple iphone os 1.0.1

apple iphone os 1.0.2

apple iphone os 2.0.0

apple iphone os 2.0.1

apple iphone os 3.0.1

apple iphone os 3.1

apple iphone os 4.0.1

apple iphone os 4.0.2

apple iphone os 4.3.3

apple iphone os 4.3.5

Github Repositories

iSniff GPS iSniff GPS passively sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices The aim is to collect data which can be used to identify each device and determine previous geographical locations, based solely on information each device discloses about previously joined WiFi networks iOS devices transmit ARP

Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices

iSniff GPS iSniff GPS passively sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices The aim is to collect data which can be used to identify each device and determine previous geographical locations, based solely on information each device discloses about previously joined WiFi networks iOS devices transmit ARP