| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.2 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Apple Mac OS X up to 10.8 and classified as problematic. Affected by this vulnerability is the function srandomdev of the component Libc. Performing a manipulation results in cryptographic issue.
This vulnerability was named CVE-2013-5180. There is no available exploit.
The affected component should be upgraded.
Details
A vulnerability was found in Apple Mac OS X up to 10.8 (Operating System). It has been classified as critical. This affects the function srandomdev of the component Libc. The manipulation with an unknown input leads to a cryptographic issue vulnerability. CWE is classifying the issue as CWE-310. This is going to have an impact on confidentiality, and integrity. The summary by CVE is:
The srandomdev function in Libc in Apple Mac OS X before 10.9, when the kernel random-number generator is unavailable, produces predictable values instead of the intended random values, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of these values, related to a compiler-optimization issue.
The weakness was presented 10/22/2013 by Xi Wang as APPLE-SA-2013-10-22-3 as confirmed mailinglist post (Apple Security Mailinglist). It is possible to read the advisory at lists.apple.com. The mailinglist post contains:
If the kernel random number generator was not accessible to srandomdev(), the function fell back to an alternative method which had been removed by optimization, leading to a lack of randomness. This issue was addressed by modifying the code to be correct under optimization.This vulnerability is uniquely identified as CVE-2013-5180 since 08/15/2013. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1600 according to MITRE ATT&CK.
The vulnerability scanner Nessus provides a plugin with the ID 70561 (Mac OS X 10.x < 10.9 Multiple Vulnerabilities (BEAST)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family MacOS X Local Security Checks.
Upgrading to version 10.9 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (88234), Tenable (70561), SecurityFocus (BID 63347†) and Vulnerability Center (SBV-45112†). See VDB-10327, VDB-10946, VDB-10932 and VDB-10931 for similar entries. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.apple.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.2
VulDB Base Score: 6.5
VulDB Temp Score: 6.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 70561
Nessus Name: Mac OS X 10.x < 10.9 Multiple Vulnerabilities (BEAST)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Mac OS X 10.9
Timeline
08/15/2013 🔍10/22/2013 🔍
10/22/2013 🔍
10/22/2013 🔍
10/22/2013 🔍
10/23/2013 🔍
10/23/2013 🔍
06/25/2014 🔍
06/01/2021 🔍
Sources
Vendor: apple.comAdvisory: APPLE-SA-2013-10-22-3
Researcher: Xi Wang
Status: Confirmed
CVE: CVE-2013-5180 (🔍)
GCVE (CVE): GCVE-0-2013-5180
GCVE (VulDB): GCVE-100-10923
X-Force: 88234
SecurityFocus: 63347 - Apple Mac OS X CVE-2013-5180 Predictable Random Number Generator Weakness
Vulnerability Center: 45112 - Apple MacOS X Before 10.9 Remote Security Bypass due to an Error in the srandomdev Function, Low
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 10/23/2013 17:41Updated: 06/01/2021 07:33
Changes: 10/23/2013 17:41 (70), 05/31/2017 09:06 (2), 06/01/2021 07:33 (3)
Complete: 🔍
Cache ID: 216:316:103

No comments yet. Languages: en.
Please log in to comment.