Vulnerability Details : CVE-2009-2192
MobileMe in Apple Mac OS X 10.5 before 10.5.8 does not properly delete credentials upon signout from the preference pane, which makes it easier for attackers to hijack a MobileMe session via unspecified vectors, related to a "logic issue."
Threat overview for CVE-2009-2192
Top countries where our scanners detected CVE-2009-2192
Top open port discovered on systems with this issue
548
IPs affected by CVE-2009-2192 31
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-2192!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-2192
Probability of exploitation activity in the next 30 days: 0.67%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 78 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-2192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2009-2192
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-2192
-
http://support.apple.com/kb/HT3757
About the security content of Security Update 2009-003 / Mac OS X v10.5.8 - Apple SupportPatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/52432
-
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2009/2172
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPatch;Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
Apple Updates for Multiple Vulnerabilities | CISAUS Government Resource
- http://www.securityfocus.com/bid/35954
Products affected by CVE-2009-2192
- cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*