← Back to CVEs
CVE-2016-4657
HIGHCISA KEV8.8
Description
WebKit in Apple iOS before 9.3.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published8/25/2016
Last Modified4/21/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorApple
ProductiOS
Vulnerability NameApple iOS Webkit Memory Corruption Vulnerability
KEV Date Added2022-05-24
Remediation Due Date2022-06-14
Ransomware UseUnknown
Affected Products
apple:iphone_os
Weaknesses (CWE)
CWE-787CWE-787
References
http://lists.apple.com/archives/security-announce/2016/Aug/msg00000.html(product-security@apple.com)
http://www.securityfocus.com/bid/92653(product-security@apple.com)
http://www.securitytracker.com/id/1036694(product-security@apple.com)
https://blog.lookout.com/blog/2016/08/25/trident-pegasus/(product-security@apple.com)
https://support.apple.com/HT207107(product-security@apple.com)
https://www.exploit-db.com/exploits/44836/(product-security@apple.com)
https://www.youtube.com/watch?v=xkdPjbaLngE(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Aug/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92653(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036694(af854a3a-2127-422b-91ae-364da2661108)
https://blog.lookout.com/blog/2016/08/25/trident-pegasus/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT207107(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44836/(af854a3a-2127-422b-91ae-364da2661108)
https://www.youtube.com/watch?v=xkdPjbaLngE(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-4657(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.