Vulnerability Details CVE-2015-3692
Apple Mac EFI before 2015-001, as used in OS X before 10.10.4 and other products, does not enforce a locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging root privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 10.2%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2015-3692
-
cpe:2.3:o:apple:mac_os_x:-
-
cpe:2.3:o:apple:mac_os_x:10.0
-
cpe:2.3:o:apple:mac_os_x:10.0.0
-
cpe:2.3:o:apple:mac_os_x:10.0.1
-
cpe:2.3:o:apple:mac_os_x:10.0.2
-
cpe:2.3:o:apple:mac_os_x:10.0.3
-
cpe:2.3:o:apple:mac_os_x:10.0.4
-
cpe:2.3:o:apple:mac_os_x:10.1
-
cpe:2.3:o:apple:mac_os_x:10.1.0
-
cpe:2.3:o:apple:mac_os_x:10.1.1
-
cpe:2.3:o:apple:mac_os_x:10.1.2
-
cpe:2.3:o:apple:mac_os_x:10.1.3
-
cpe:2.3:o:apple:mac_os_x:10.1.4
-
cpe:2.3:o:apple:mac_os_x:10.1.5
-
cpe:2.3:o:apple:mac_os_x:10.10.0
-
cpe:2.3:o:apple:mac_os_x:10.10.1
-
cpe:2.3:o:apple:mac_os_x:10.10.2
-
cpe:2.3:o:apple:mac_os_x:10.10.3
-
cpe:2.3:o:apple:mac_os_x:10.2
-
cpe:2.3:o:apple:mac_os_x:10.2.0
-
cpe:2.3:o:apple:mac_os_x:10.2.1
-
cpe:2.3:o:apple:mac_os_x:10.2.2
-
cpe:2.3:o:apple:mac_os_x:10.2.3
-
cpe:2.3:o:apple:mac_os_x:10.2.4
-
cpe:2.3:o:apple:mac_os_x:10.2.5
-
cpe:2.3:o:apple:mac_os_x:10.2.6
-
cpe:2.3:o:apple:mac_os_x:10.2.7
-
cpe:2.3:o:apple:mac_os_x:10.2.8
-
cpe:2.3:o:apple:mac_os_x:10.3
-
cpe:2.3:o:apple:mac_os_x:10.3.0
-
cpe:2.3:o:apple:mac_os_x:10.3.1
-
cpe:2.3:o:apple:mac_os_x:10.3.2
-
cpe:2.3:o:apple:mac_os_x:10.3.3
-
cpe:2.3:o:apple:mac_os_x:10.3.4
-
cpe:2.3:o:apple:mac_os_x:10.3.5
-
cpe:2.3:o:apple:mac_os_x:10.3.6
-
cpe:2.3:o:apple:mac_os_x:10.3.7
-
cpe:2.3:o:apple:mac_os_x:10.3.8
-
cpe:2.3:o:apple:mac_os_x:10.3.9
-
cpe:2.3:o:apple:mac_os_x:10.4
-
cpe:2.3:o:apple:mac_os_x:10.4.0
-
cpe:2.3:o:apple:mac_os_x:10.4.1
-
cpe:2.3:o:apple:mac_os_x:10.4.10
-
cpe:2.3:o:apple:mac_os_x:10.4.11
-
cpe:2.3:o:apple:mac_os_x:10.4.2
-
cpe:2.3:o:apple:mac_os_x:10.4.3
-
cpe:2.3:o:apple:mac_os_x:10.4.4
-
cpe:2.3:o:apple:mac_os_x:10.4.5
-
cpe:2.3:o:apple:mac_os_x:10.4.6
-
cpe:2.3:o:apple:mac_os_x:10.4.7
-
cpe:2.3:o:apple:mac_os_x:10.4.8
-
cpe:2.3:o:apple:mac_os_x:10.4.9
-
cpe:2.3:o:apple:mac_os_x:10.5
-
cpe:2.3:o:apple:mac_os_x:10.5.0
-
cpe:2.3:o:apple:mac_os_x:10.5.1
-
cpe:2.3:o:apple:mac_os_x:10.5.2
-
cpe:2.3:o:apple:mac_os_x:10.5.3
-
cpe:2.3:o:apple:mac_os_x:10.5.4
-
cpe:2.3:o:apple:mac_os_x:10.5.5
-
cpe:2.3:o:apple:mac_os_x:10.5.6
-
cpe:2.3:o:apple:mac_os_x:10.5.7
-
cpe:2.3:o:apple:mac_os_x:10.5.8
-
cpe:2.3:o:apple:mac_os_x:10.6.0
-
cpe:2.3:o:apple:mac_os_x:10.6.1
-
cpe:2.3:o:apple:mac_os_x:10.6.2
-
cpe:2.3:o:apple:mac_os_x:10.6.3
-
cpe:2.3:o:apple:mac_os_x:10.6.4
-
cpe:2.3:o:apple:mac_os_x:10.6.5
-
cpe:2.3:o:apple:mac_os_x:10.6.6
-
cpe:2.3:o:apple:mac_os_x:10.6.7
-
cpe:2.3:o:apple:mac_os_x:10.6.8
-
cpe:2.3:o:apple:mac_os_x:10.7.0
-
cpe:2.3:o:apple:mac_os_x:10.7.1
-
cpe:2.3:o:apple:mac_os_x:10.7.2
-
cpe:2.3:o:apple:mac_os_x:10.7.3
-
cpe:2.3:o:apple:mac_os_x:10.7.4
-
cpe:2.3:o:apple:mac_os_x:10.7.5
-
cpe:2.3:o:apple:mac_os_x:10.8.0
-
cpe:2.3:o:apple:mac_os_x:10.8.1
-
cpe:2.3:o:apple:mac_os_x:10.8.2
-
cpe:2.3:o:apple:mac_os_x:10.8.3
-
cpe:2.3:o:apple:mac_os_x:10.8.4
-
cpe:2.3:o:apple:mac_os_x:10.8.5
-
cpe:2.3:o:apple:mac_os_x:10.9
-
cpe:2.3:o:apple:mac_os_x:10.9.1
-
cpe:2.3:o:apple:mac_os_x:10.9.2
-
cpe:2.3:o:apple:mac_os_x:10.9.3
-
cpe:2.3:o:apple:mac_os_x:10.9.4
-
cpe:2.3:o:apple:mac_os_x:10.9.5