About the security content of iOS 11
This document describes the security content of iOS 11.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss or confirm security issues until an investigation has taken place and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.
iOS 11
802.1X
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker may be able to exploit weaknesses in TLS 1.0
Description: A protocol security issue was addressed by enabling TLS 1.1 and TLS 1.2.
CVE-2017-13832: Doug Wussler of Florida State University
APNs
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker in a privileged network position could track a user
Description: A privacy issue existed in the use of client certificates. This issue was addressed through a revised protocol.
CVE-2017-13863: FURIOUSMAC Team of United States Naval Academy
Bluetooth
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to access restricted files
Description: A privacy issue existed in the handling of Contact cards. This was addressed with improved state management.
CVE-2017-7131: Dominik Conrads of Federal Office for Information Security, an anonymous researcher, Anand Kathapurkar of India, Elvis (@elvisimprsntr)
CFNetwork
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-13829: Niklas Baumstark and Samuel Gro working with Trend Micro's Zero Day Initiative
CVE-2017-13833: Niklas Baumstark and Samuel Gro working with Trend Micro's Zero Day Initiative
CFNetwork Proxies
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker in a privileged network position may be able to cause a denial of service
Description: Multiple denial-of-service issues were addressed through improved memory handling.
CVE-2017-7083: Abhinav Bansal of Zscaler Inc.
CFString
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitisation.
CVE-2017-13821: Australian Cyber Security Centre – Australian Signals Directorate
CoreAudio
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to read restricted memory
Description: An out-of-bounds read was addressed by updating to Opus version 1.1.4.
CVE-2017-0381: V.E.O (@VYSEa) of Mobile Threat Research Team, Trend Micro
CoreText
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing a maliciously crafted font file may lead to arbitrary code execution
Description: A memory consumption issue was addressed with improved memory handling.
CVE-2017-13825: Australian Cyber Security Centre – Australian Signals Directorate
Exchange ActiveSync
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker in a privileged network position may be able to erase a device during Exchange account setup
Description: A validation issue existed in AutoDiscover V1. This was addressed by requiring TLS for AutoDiscover V1. AutoDiscover V2 is now supported.
CVE-2017-7088: Ilya Nesterov, Maxim Goncharov
file
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Multiple issues in file
Description: Multiple issues were addressed by updating to version 5.31.
CVE-2017-13815: found by OSS-Fuzz
Fonts
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Rendering untrusted text may lead to spoofing
Description: An inconsistent user interface issue was addressed with improved state management.
CVE-2017-13828: Leonard Grey and Robert Sesek of Google Chrome
Heimdal
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker in a privileged network position may be able to impersonate a service
Description: A validation issue existed in the handling of the KDC-REP service name. This issue was addressed through improved validation.
CVE-2017-11103: Jeffrey Altman, Viktor Duchovni and Nico Williams
HFS
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum
iBooks
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Parsing a maliciously crafted iBooks file may lead to a persistent denial of service
Description: Multiple denial-of-service issues were addressed through improved memory handling.
CVE-2017-7072: Jędrzej Krysztofiak
ImageIO
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing a maliciously crafted image may lead to arbitrary code execution
Description: A memory corruption issue was addressed with improved input validation.
CVE-2017-13814: Australian Cyber Security Centre – Australian Signals Directorate
ImageIO
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing a maliciously crafted image may lead to a denial of service
Description: A memory corruption issue was addressed with improved input validation.
CVE-2017-13831: Glen Carmichael
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7114: Alex Plaskett of MWR InfoSecurity
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A local user may be able to read kernel memory
Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation.
CVE-2017-13817: Maxime Villard (m00nbsd)
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitisation.
CVE-2017-13818: The UK's National Cyber Security Centre (NCSC)
CVE-2017-13836: Vlad Tsyrklevich
CVE-2017-13841: Vlad Tsyrklevich
CVE-2017-13840: Vlad Tsyrklevich
CVE-2017-13842: Vlad Tsyrklevich
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-13843: an anonymous researcher, an anonymous researcher
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-13854: shrek_wzw of Qihoo 360 Nirvan Team
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing a malformed mach binary may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved validation.
CVE-2017-13834: Maxime Villard (m00nbsd)
Kernel
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A malicious application may be able to learn information about the presence and operation of other applications on the device.
Description: An application was able to access network activity information maintained by the operating system unrestricted. This issue was addressed by reducing the information available to third-party applications.
CVE-2017-13873: Xiaokuan Zhang and Yinqian Zhang of The Ohio State University, Xueqiang Wang and XiaoFeng Wang of Indiana University Bloomington, and Xiaolong Bai of Tsinghua University
Keyboard Suggestions
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Keyboard autocorrect suggestions may reveal sensitive information
Description: The iOS keyboard was inadvertently caching sensitive information. This issue was addressed with improved heuristics.
CVE-2017-7140: Agim Allkanjari of Stream in Motion Inc.
libarchive
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution
Description: A buffer overflow issue was addressed through improved memory handling.
CVE-2017-13813: found by OSS-Fuzz
CVE-2017-13816: found by OSS-Fuzz
libarchive
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution
Description: Multiple memory corruption issues existed in libarchive. These issues were addressed through improved input validation.
CVE-2017-13812: found by OSS-Fuzz
libc
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A remote attacker may be able to cause a denial-of-service
Description: A resource exhaustion issue in glob() was addressed through an improved algorithm.
CVE-2017-7086: Russ Cox of Google
libc
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to cause a denial of service
Description: A memory consumption issue was addressed through improved memory handling.
CVE-2017-1000373
libexpat
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Multiple issues in expat
Description: Multiple issues were addressed by updating to version 2.2.1
CVE-2016-9063
CVE-2017-9233
libxml2
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow issue was addressed with improved memory handling.
CVE-2017-7376: an anonymous researcher
CVE-2017-5130: an anonymous researcher
libxml2
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue was addressed with improved input validation.
CVE-2017-9050: Mateusz Jurczyk (j00ru) of Google Project Zero
libxml2
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution
Description: A use after free issue was addressed with improved memory management.
CVE-2017-9049: Wei Lei and Liu Yang - Nanyang Technological University in Singapore
libxml2
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution
Description: A null pointer dereference was addressed with improved validation.
CVE-2018-4302: Gustavo Grieco
Location Framework
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to read sensitive location information
Description: A permissions issue existed in the handling of the location variable. This was addressed with additional ownership checks.
CVE-2017-7148: Igor Makarov from Moovit, Will McGinty and Shawnna Rodriguez of Bottle Rocket Studios
Mail Drafts
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker with a privileged network position may be able to intercept mail contents
Description: An encryption issue existed in the handling of mail drafts. This issue was addressed with improved handling of mail drafts meant to be sent encrypted.
CVE-2017-7078: Petter Flink, Pierre ALBARÈDE from Marseille (France), an anonymous researcher
Mail MessageUI
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing a maliciously crafted image may lead to a denial of service
Description: A memory corruption issue was addressed with improved validation.
CVE-2017-7097: Xinshu Dong and Jun Hao Tan of Anquan Capital
Messages
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing a maliciously crafted image may lead to a denial of service
Description: A denial of service issue was addressed through improved validation.
CVE-2017-7118: Kiki Jiang and Jason Tokoph
MobileBackup
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Backup may perform an unencrypted backup despite a requirement to perform only encrypted backups
Description: A permissions issue existed. This issue was addressed with improved permission validation.
CVE-2017-7133: Don Sparks of HackediOS.com
Notes
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A local user may be able to leak sensitive user information
Description: The contents of locked notes sometimes appeared in search results. This issue was addressed through improved data cleanup.
CVE-2017-7075: Richard Will of Marathon Oil Company
Phone
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A screenshot of secure content may be taken when locking an iOS device
Description: A timing issue existed in the handling of locking. This issue was addressed by disabling screenshots while locking.
CVE-2017-7139: an anonymous researcher
Profiles
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Device pairing records could be inadvertently installed on a device when a profile that disallows pairing is installed
Description: Pairings were not removed when a profile disallowing pairings was installed. This was addressed by removing pairings conflicting with the configuration profile.
CVE-2017-13806: Rorie Hood of MWR InfoSecurity
Quick Look
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitisation.
CVE-2017-13822: Australian Cyber Security Centre – Australian Signals Directorate
Quick Look
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution
Description: A memory consumption issue was addressed through improved memory handling.
CVE-2017-7132: Australian Cyber Security Centre – Australian Signals Directorate
Safari
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with improved state management.
CVE-2017-7085: xisigr of Tencent's Xuanwu Lab (tencent.com)
Sandbox Profiles
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A malicious application may be able to learn information about the presence of other applications on the device.
Description: An application was able to determine the existence of files outside of its sandbox. This issue was addressed through additional sandbox checks.
CVE-2017-13877: Xiaokuan Zhang and Yinqian Zhang of The Ohio State University, Xueqiang Wang and XiaoFeng Wang of Indiana University Bloomington, and Xiaolong Bai of Tsinghua University
Security
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A revoked certificate may be trusted
Description: A certificate validation issue existed in the handling of revocation data. This issue was addressed through improved validation.
CVE-2017-7080: an anonymous researcher, an anonymous researcher, Sven Driemecker of adesso mobile solutions gmbh, Rune Darrud (@theflyingcorpse) of Bærum kommune
Security
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A malicious app may be able to track users between installs
Description: A permission checking issue existed in the handling of an app's Keychain data. This issue was addressed with improved permission checking.
CVE-2017-7146: an anonymous researcher
SQLite
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Multiple issues in SQLite
Description: Multiple issues were addressed by updating to version 3.19.3.
CVE-2017-10989: found by OSS-Fuzz
CVE-2017-7128: found by OSS-Fuzz
CVE-2017-7129: found by OSS-Fuzz
CVE-2017-7130: found by OSS-Fuzz
SQLite
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7127: an anonymous researcher
Telephony
Available for: iPhone 5s and later, and Wi-Fi + Cellular models of iPad Air generation and later
Impact: An attacker within range may be able to execute arbitrary code
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-6211: Matthew Spisak of ENDGAME (endgame.com)
Time
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: "Setting Time Zone" may incorrectly indicate that it is using location
Description: A permissions issue existed in the process that handles time zone information. The issue was resolved by modifying permissions.
CVE-2017-7145: Chris Lawrence
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved input validation.
CVE-2017-7081: Apple
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed with improved memory handling.
CVE-2017-7087: Apple
CVE-2017-7091: Wei Yuan of Baidu Security Lab working with Trend Micro’s Zero Day Initiative
CVE-2017-7092: Samuel Gro and Niklas Baumstark working with Trend Micro's Zero Day Initiative, Qixun Zhao (@S0rryMybad) of Qihoo 360 Vulcan Team
CVE-2017-7093: Samuel Gro and Niklas Baumstark working with Trend Micro’s Zero Day Initiative
CVE-2017-7094: Tim Michaud (@TimGMichaud) of Leviathan Security Group
CVE-2017-7095: Wang Junjie, Wei Lei and Liu Yang of Nanyang Technological University working with Trend Micro’s Zero Day Initiative
CVE-2017-7096: Wei Yuan of Baidu Security Lab
CVE-2017-7098: Felipe Freitas of Instituto Tecnológico de Aeronáutica
CVE-2017-7099: Apple
CVE-2017-7100: Masato Kinugawa and Mario Heiderich of Cure53
CVE-2017-7102: Wang Junjie, Wei Lei, and Liu Yang of Nanyang Technological University
CVE-2017-7104: likemeng of Baidu Secutity Lab
CVE-2017-7107: Wang Junjie, Wei Lei and Liu Yang of Nanyang Technological University
CVE-2017-7111: likemeng of Baidu Security Lab (xlab.baidu.com) working with Trend Micro's Zero Day Initiative
CVE-2017-7117: lokihardt of Google Project Zero
CVE-2017-7120: chenqin (陈钦) of Ant-financial Light-Year Security Lab
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to universal cross site scripting
Description: A logic issue existed in the handling of the parent-tab. This issue was addressed with improved state management.
CVE-2017-7089: Anton Lopanitsyn of ONSEC, Frans Rosén of Detectify
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Cookies belonging to one origin may be sent to another origin
Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed by no longer returning cookies for custom URL schemes.
CVE-2017-7090: Apple
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with improved state management.
CVE-2017-7106: Oliver Paukstadt of Thinking Objects GmbH (to.com)
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to a cross-site scripting attack
Description: Application Cache policy may be unexpectedly applied.
CVE-2017-7109: avlidienbrunn
WebKit
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A malicious website may be able to track users in Safari private browsing mode
Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed with improved restrictions.
CVE-2017-7144: Mohammad Ghasemisharif of UIC’s BITS Lab
WebKit Storage
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Website data may persist after a Safari Private browsing session
Description: An information leakage issue existed in the handling of website data in Safari Private windows. This issue was addressed with improved data handling.
CVE-2017-7142: Rich Shawn O’Connell, an anonymous researcher, an anonymous researcher
Wi-Fi
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-11120: Gal Beniamini of Google Project Zero
CVE-2017-11121: Gal Beniamini of Google Project Zero
Wi-Fi
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Malicious code executing on the Wi-Fi chip may be able to execute arbitrary code with kernel privileges on the application processor
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7103: Gal Beniamini of Google Project Zero
CVE-2017-7105: Gal Beniamini of Google Project Zero
CVE-2017-7108: Gal Beniamini of Google Project Zero
CVE-2017-7110: Gal Beniamini of Google Project Zero
CVE-2017-7112: Gal Beniamini of Google Project Zero
Wi-Fi
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Malicious code executing on the Wi-Fi chip may be able to execute arbitrary code with kernel privileges on the application processor
Description: Multiple race conditions were addressed through improved validation.
CVE-2017-7115: Gal Beniamini of Google Project Zero
Wi-Fi
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Malicious code executing on the Wi-Fi chip may be able to read restricted kernel memory
Description: A validation issue was addressed with improved input sanitisation.
CVE-2017-7116: Gal Beniamini of Google Project Zero
Wi-Fi
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: A attacker within range may be able to read restricted memory from the Wi-Fi chipset
Description: A validation issue was addressed with improved input sanitisation.
CVE-2017-11122: Gal Beniamini of Google Project Zero
zlib
Available for: iPhone 5s and later, iPad Air and later and iPod touch 6th generation
Impact: Multiple issues in zlib
Description: Multiple issues were addressed by updating to version 1.2.11.
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2016-9843
Additional recognition
LaunchServices
We would like to acknowledge Mark Zimmermann of EnBW Energie Baden-Württemberg AG for their assistance.
Security
We would like to acknowledge Abhinav Bansal of Zscaler, Inc. for their assistance.
Webkit
We would like to acknowledge xisigr of Tencent's Xuanwu Lab (tencent.com) for their assistance.
WebKit
We would like to acknowledge Rayyan Bijoora (@Bijoora) of The City School, PAF Chapter for their assistance.
WebKit Web Inspector
We would like to acknowledge Ioan Bizău of Bloggify for their assistance.
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.