PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-4678 Apple CVE debrief

CVE-2016-4678 is a high-severity local vulnerability in macOS before 10.12.1 affecting the AppleSMC component. According to NVD, local users could gain privileges or trigger a denial of service through unspecified vectors, and the weakness is classified as a NULL pointer dereference (CWE-476). The NVD record shows a local attack path with low attack complexity and no user interaction, which makes this especially important on systems where untrusted local accounts, shared logins, or remote desktop access are present.

Vendor
Apple
Product
CVE-2016-4678
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

macOS administrators, endpoint security teams, and anyone responsible for Macs running versions earlier than 10.12.1. It is most relevant where local access is shared or less trusted, because the issue requires local privileges but can lead to full compromise or system instability.

Technical summary

NVD maps the issue to AppleSMC on macOS versions up to 10.12.0. The vulnerability is described as allowing local users to gain privileges or cause a denial of service via unspecified vectors, and NVD identifies CWE-476 (NULL pointer dereference). The published CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating a local attack that can affect confidentiality, integrity, and availability. Apple’s advisory is referenced in the NVD record.

Defensive priority

High. Although exploitation requires local privileges, the impact includes privilege escalation and system disruption, and the NVD scoring reflects potential full CIA compromise. Prioritize patching any affected macOS deployment that has not been brought to 10.12.1 or later.

Recommended defensive actions

  • Update affected macOS systems to 10.12.1 or later.
  • Inventory Macs running versions earlier than 10.12.1 and verify remediation status.
  • Limit untrusted local access and apply least-privilege controls on shared systems.
  • Treat any unexplained crashes or privilege anomalies on pre-10.12.1 systems as potentially relevant until patched.
  • Use the Apple security advisory referenced by NVD to confirm vendor guidance for your fleet.

Evidence notes

The supplied NVD metadata states: affected CPE criteria include macOS versions ending at 10.12.0; the weakness is CWE-476; and the CVSS vector is CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The description explicitly names the AppleSMC component and says local users may gain privileges or cause denial of service. NVD references Apple’s support advisory URL, but no additional advisory text was ingested here.

Official resources

Published in the NVD record on 2017-02-20 and last modified on 2026-05-13. No CISA KEV entry was provided in the supplied data.