PatchSiren cyber security CVE debrief
CVE-2016-4667 Apple CVE debrief
CVE-2016-4667 is an Apple macOS vulnerability in the ATS component affecting versions before 10.12.1. According to NVD, a crafted font can trigger memory corruption, which may lead to remote code execution or a denial of service through an application crash. The issue was publicly disclosed on 2017-02-20 and is rated HIGH with a CVSS 3.0 score of 8.8.
- Vendor
- Apple
- Product
- CVE-2016-4667
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-20
- Advisory updated
- 2026-05-13
Who should care
MacOS administrators, endpoint security teams, and users or services that process untrusted fonts or documents should pay attention, especially on systems still running macOS 10.12.0 or earlier.
Technical summary
NVD identifies the weakness as CWE-119 and lists macOS versions up to 10.12.0 as vulnerable. The attack vector is network-based but requires user interaction, consistent with a crafted font being opened or processed by the ATS component. Impact is described as memory corruption that can result in arbitrary code execution or an application crash. Apple’s vendor advisory is referenced in the NVD record as support.apple.com/HT207275.
Defensive priority
High. The combination of remote attack potential, code-execution impact, and a high CVSS score makes this a priority remediation item for any remaining pre-10.12.1 macOS systems.
Recommended defensive actions
- Upgrade affected macOS systems to 10.12.1 or later, or the newest supported Apple release available.
- Verify no endpoints remain on macOS 10.12.0 or earlier using asset inventory and compliance checks.
- Treat untrusted font files and documents as risky inputs on affected systems until patched.
- Use Apple’s vendor advisory and related references to confirm the appropriate remediation path for your environment.
- If patching is delayed, restrict exposure of vulnerable systems to untrusted content sources as much as possible.
Evidence notes
All core claims in this debrief come from the supplied NVD record: affected product scope (macOS through 10.12.0), vulnerability type (ATS memory corruption), impact (arbitrary code execution or denial of service via crafted font), CVSS 3.0 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), and weakness classification (CWE-119). Apple’s support.apple.com/HT207275 advisory is listed by NVD as a vendor reference, but no direct advisory text was provided in the source corpus.
Official resources
-
CVE-2016-4667 CVE record
CVE.org
-
CVE-2016-4667 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed on 2017-02-20; later modified in the source database on 2026-05-13. The debrief uses the CVE publication date for disclosure timing.