Apple iOS prior to 8 enables Bluetooth during all upgrade actions, which makes it easier for remote malicious users to bypass intended access restrictions via a Bluetooth session.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple iphone os 7.0 |
||
apple iphone os 7.1.1 |
||
apple iphone os 7.0.6 |
||
apple iphone os 7.1 |
||
apple iphone os |
||
apple iphone os 7.0.5 |
||
apple iphone os 7.0.4 |
||
apple iphone os 7.0.3 |
||
apple iphone os 7.0.2 |
||
apple iphone os 7.0.1 |