| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as problematic has been found in Apple Mac OS X up to 10.10.4. This affects an unknown part of the component Bluetooth. The manipulation results in information disclosure. This vulnerability was named CVE-2015-3786. In addition, an exploit is available. The affected component should be upgraded.
Details
A vulnerability, which was classified as problematic, was found in Apple Mac OS X up to 10.10.4 (Operating System). Affected is an unknown part of the component Bluetooth. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. This is going to have an impact on confidentiality. CVE summarizes:
The Bluetooth subsystem in Apple OS X before 10.10.5 does not properly restrict Notification Center Service access, which allows attackers to read Notification Center notifications of certain paired devices via a crafted app.
The weakness was presented 08/11/2015 by Maxime Villard with Google Security Team as HT205031 as confirmed advisory (Website). The advisory is available at support.apple.com. This vulnerability is traded as CVE-2015-3786 since 05/07/2015. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. Technical details are unknown but a public exploit is available. This vulnerability is assigned to T1592 by the MITRE ATT&CK project.
A public exploit has been developed in Ruby. The exploit is shared for download at securityfocus.com. It is declared as proof-of-concept. As 0-day the estimated underground price was around $25k-$100k. The commercial vulnerability scanner Qualys is able to test this issue with plugin 123806 (Apple Mac OS X v10.10.5 and Security Update 2015-006 Not Installed (APPLE-SA-2015-08-13-2)).
Upgrading to version 10.10.5 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 76340†), SecurityTracker (ID 1033276†) and Vulnerability Center (SBV-52032†). See VDB-77174, VDB-77175, VDB-77176 and VDB-77177 for similar entries. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.apple.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 801105
OpenVAS Name: Apple Mac OS X Multiple Vulnerabilities-03 October-15
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Mac OS X 10.10.5
Timeline
05/07/2015 🔍08/11/2015 🔍
08/11/2015 🔍
08/13/2015 🔍
08/13/2015 🔍
08/14/2015 🔍
08/14/2015 🔍
08/16/2015 🔍
08/16/2015 🔍
02/02/2025 🔍
Sources
Vendor: apple.comAdvisory: HT205031
Researcher: Maxime Villard
Organization: Google Security Team
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2015-3786 (🔍)
GCVE (CVE): GCVE-0-2015-3786
GCVE (VulDB): GCVE-100-77178
SecurityFocus: 76340 - Apple Mac OS X Prior to 10.10.5 Multiple Security Vulnerabilities
SecurityTracker: 1033276 - Apple OS X Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Deny Service and Let Local Users Gain Elevated Privileges
Vulnerability Center: 52032 - Apple MacOS X 10.10 through 10.10.4 Remote Information Disclosure Vulnerability - CVE-2015-3786, Medium
scip Labs: https://www.scip.ch/en/?labs.20150108
See also: 🔍
Entry
Created: 08/14/2015 14:33Updated: 02/02/2025 22:09
Changes: 08/14/2015 14:33 (67), 10/15/2017 11:34 (13), 02/02/2025 22:09 (18)
Complete: 🔍
Cache ID: 216:EF6:103

No comments yet. Languages: en.
Please log in to comment.