CVE-2015-5894
Description
The X.509 certificate-trust implementation in Apple OS X before 10.11 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apple OS X before 10.11 fails to enforce revocation checking when the kSecRevocationRequirePositiveResponse flag is set, enabling MITM attacks with revoked certificates.
Vulnerability
The X.509 certificate-trust implementation in Apple OS X before version 10.11 does not correctly handle the kSecRevocationRequirePositiveResponse flag. When this flag is set, the system should require a positive response from the revocation server to trust a certificate. However, the implementation does not recognize that setting this flag implies a mandatory revocation-checking requirement. This flaw allows revoked certificates to be accepted as valid, undermining the trust model. Affected versions include all releases of OS X prior to 10.11 El Capitan [1].
Exploitation
An attacker with a privileged network position (such as a man-in-the-middle) can exploit this vulnerability by presenting a revoked certificate to the target system. The attacker must have access to a certificate that has been previously revoked by the issuing Certificate Authority. Because the system does not enforce revocation checking when the kSecRevocationRequirePositiveResponse flag is present, the revoked certificate is improperly trusted. No additional authentication or user interaction is required beyond network access [1].
Impact
Successful exploitation allows the attacker to impersonate trusted endpoints over secure connections. This can lead to interception or modification of encrypted communications, disclosure of sensitive data, and further compromise of the target system. The attacker effectively bypasses the intended certificate revocation mechanism, defeating a core security control for TLS/SSL and other X.509-based protocols [1].
Mitigation
The vulnerability is addressed in OS X 10.11 El Capitan, released on September 30, 2015. Users should upgrade to this version or later to remediate the issue. No official workarounds have been provided for systems that cannot be updated. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <10.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlnvdVendor Advisory
- support.apple.com/HT205267nvdVendor Advisory
- www.securityfocus.com/bid/76908nvd
- www.securitytracker.com/id/1033703nvd
News mentions
0No linked articles in our index yet.