VYPR
Medium severity5.6NVD Advisory· Published Sep 18, 2014· Updated May 6, 2026

CVE-2014-4364

CVE-2014-4364

Description

The 802.1X subsystem in Apple iOS before 8 and Apple TV before 7 does not require strong authentication methods, which allows remote attackers to calculate credentials by offering LEAP authentication from a crafted Wi-Fi AP and then performing a cryptographic attack against the MS-CHAPv1 hash.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apple iOS/Apple TV 802.1X subsystem allowed LEAP authentication, enabling attacker to compute Wi-Fi credentials from crafted AP.

Vulnerability

The 802.1X subsystem in Apple iOS before 8 and Apple TV before 7 accepts LEAP (Lightweight Extensible Authentication Protocol) authentication offered by a Wi-Fi access point without requiring strong authentication methods [1][2][3]. Affected versions: iOS versions prior to 8 (iPhone 4s and later, iPod touch 5th generation and later, iPad 2 and later) and Apple TV versions prior to 7 (3rd generation and later). LEAP uses MS-CHAPv1, which is vulnerable to offline dictionary attacks.

Exploitation

An attacker must be within wireless range to set up a rogue Wi-Fi access point that connects to the victim's target network. The rogue AP offers LEAP authentication; when the victim device connects, the attacker captures the MS-CHAPv1 challenge-response handshake. The attacker then performs a cryptographic attack against the MS-CHAPv1 hash to recover the user's domain credentials (username and password). No prior authentication or user interaction beyond connecting to the rogue AP is required [1][2][3].

Impact

Successful exploitation allows the attacker to derive the victim's Wi-Fi credentials (often domain credentials). With those credentials, the attacker can authenticate to the intended legitimate access point, potentially gaining unauthorized network access, intercepting traffic, or further compromising the network. This impacts confidentiality of network communications and credentials [1][2][3].

Mitigation

Apple iOS 8 [1] and Apple TV 7 [3] address the issue by disabling LEAP by default or removing support for LEAP entirely. For iOS, the fix is included in iOS 8 (released September 17, 2014). For Apple TV, the fix is in Apple TV software version 7 (also released September 17, 2014). No workaround is available for unpatched devices; users should update to the latest software versions. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog as of this writing.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

19
  • cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*range: <=7.1.2
    • cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*
  • Apple Inc./tvOS7 versions
    cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*range: <=6.2
    • cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.1.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:tvos:6.1.2:*:*:*:*:*:*:*
  • Apple Inc./iOSllm-fuzzy
    Range: <8
  • Range: <7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.