VYPR
Unrated severityNVD Advisory· Published Jan 30, 2015· Updated May 6, 2026

CVE-2014-4492

CVE-2014-4492

Description

libnetcore in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not verify that certain values have the expected data type, which allows attackers to execute arbitrary code in an _networkd context via a crafted XPC message from a sandboxed app, as demonstrated by lack of verification of the XPC dictionary data type.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A type confusion vulnerability in libnetcore on Apple devices allows sandboxed apps to execute arbitrary code in networkd context via crafted XPC messages.

Vulnerability

The libnetcore component in Apple iOS before 8.1.3, OS X before 10.10.2, and Apple TV before 7.0.3 fails to verify that certain values in XPC messages have the expected data type. This type confusion vulnerability can be triggered when a sandboxed app sends a crafted XPC message to the networkd process. Affected versions: iOS <8.1.3, OS X <10.10.2, Apple TV <7.0.3. [1][2][3]

Exploitation

An attacker with a sandboxed app installed on the device can send a specially crafted XPC dictionary with incorrect data types. The XPC message is processed by networkd without proper type checking, leading to memory corruption. No additional authentication is required beyond having access to run a sandboxed app. The attack vector is local but from within the sandbox. [1][2][3]

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the networkd process, which runs with higher privileges. This effectively results in a sandbox escape, granting the attacker elevated capabilities on the system. [1][2][3]

Mitigation

Apple addressed this issue in iOS 8.1.3, OS X Yosemite v10.10.2 and Security Update 2015-001, and Apple TV 7.0.3. Users should update to the latest versions. No workarounds are available. The vulnerability is not listed in CISA KEV. [1][2][3]

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.