Security bypass vulnerability in EFI component in Apple Mac OS X during the EFI update processID: oval:org.secpod.oval:def:30901 | Date: (C)2015-11-06 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an Apple Ethernet Thunderbolt adapter with crafted code in an Option ROM. Successful exploitation could allow physically proximate attackers to modify firmware during the EFI update process.
Platform: |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.6 |
Apple Mac OS X 10.7 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X Server 10.10 |
Apple Mac OS X Server 10.6 |
Apple Mac OS X Server 10.7 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |