VYPR
Unrated severityNVD Advisory· Published Oct 9, 2015· Updated May 6, 2026

CVE-2015-5894

CVE-2015-5894

Description

The X.509 certificate-trust implementation in Apple OS X before 10.11 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apple OS X before 10.11 fails to enforce revocation checking when the kSecRevocationRequirePositiveResponse flag is set, enabling MITM attacks with revoked certificates.

Vulnerability

The X.509 certificate-trust implementation in Apple OS X before version 10.11 does not correctly handle the kSecRevocationRequirePositiveResponse flag. When this flag is set, the system should require a positive response from the revocation server to trust a certificate. However, the implementation does not recognize that setting this flag implies a mandatory revocation-checking requirement. This flaw allows revoked certificates to be accepted as valid, undermining the trust model. Affected versions include all releases of OS X prior to 10.11 El Capitan [1].

Exploitation

An attacker with a privileged network position (such as a man-in-the-middle) can exploit this vulnerability by presenting a revoked certificate to the target system. The attacker must have access to a certificate that has been previously revoked by the issuing Certificate Authority. Because the system does not enforce revocation checking when the kSecRevocationRequirePositiveResponse flag is present, the revoked certificate is improperly trusted. No additional authentication or user interaction is required beyond network access [1].

Impact

Successful exploitation allows the attacker to impersonate trusted endpoints over secure connections. This can lead to interception or modification of encrypted communications, disclosure of sensitive data, and further compromise of the target system. The attacker effectively bypasses the intended certificate revocation mechanism, defeating a core security control for TLS/SSL and other X.509-based protocols [1].

Mitigation

The vulnerability is addressed in OS X 10.11 El Capitan, released on September 30, 2015. Users should upgrade to this version or later to remediate the issue. No official workarounds have been provided for systems that cannot be updated. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.