VYPR
Unrated severityNVD Advisory· Published Jul 3, 2015· Updated May 6, 2026

CVE-2015-3684

CVE-2015-3684

Description

The HTTPAuthentication implementation in CFNetwork in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted credentials in a URL.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Crafted credentials in a URL cause memory corruption in CFNetwork's HTTPAuthentication on iOS and OS X, potentially leading to arbitrary code execution or denial of service.

Vulnerability

The HTTPAuthentication implementation in CFNetwork contains a memory corruption vulnerability that is triggered when crafted credentials are provided in a URL. This affects Apple iOS before 8.4 and OS X before 10.10.4, as stated in the official CVE description [1][2]. The bug lies in the handling of user credential strings during HTTP authentication, and it does not require any special configuration beyond making a network request with a maliciously crafted URL.

Exploitation

An attacker can exploit this vulnerability by supplying a URL containing specially crafted credentials to a vulnerable device. The attack does not require authentication; it is remotely exploitable over the network. The vulnerable CFNetwork component is used by any application that processes HTTP URLs, including Safari and third-party apps. The attacker only needs to deliver the malicious URL, for example via a link, a web page, or a crafted network response, to trigger the memory corruption during parsing.

Impact

Successful exploitation can lead to arbitrary code execution or a denial of service (application crash) on the target device. The memory corruption occurs with the privileges of the application processing the URL, potentially full user-level access. On iOS this could affect system services and lead to a complete compromise of the device; on OS X, it could affect the user session. The impact is rated critical due to the remote attack vector and lack of required authentication.

Mitigation

Apple addressed this vulnerability in iOS 8.4 and OS X Yosemite v10.10.4, released July 2015 [1][2]. All users should update their devices to these versions or later. No workarounds are available; the only mitigation is to apply the security updates. There is no indication that this CVE is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.