2.1
CVSSv2

CVE-2020-3859

Published: 27/02/2020 Updated: 02/03/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 2.4 | Impact Score: 1.4 | Exploitability Score: 0.9
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apple iOS and iPadOS could allow a physical malicious user to bypass security restrictions, caused by an inconsistent user interface issue in the Messages component. An attacker could exploit this vulnerability to gain access to contacts from the lock screen.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple ipados

apple iphone os

Vendor Advisories

About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security updates page Apple security documents reference vulnerabilities by CVE-ID when possible ...

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-1-28-1 iOS 1331 and iPadOS 1331 iOS 1331 and iPadOS 1331 are now available and address the following: Audio Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An application may be able to execute arbitrary co ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-1-28-1 iOS 1331 and iPadOS 1331 iOS 1331 and iPadOS 1331 are now available and address the following: Audio Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An application may be able to execute arbitrary co ...