PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-7605 Apple CVE debrief

CVE-2016-7605 is a macOS Bluetooth issue that can let a crafted app trigger a NULL pointer dereference and crash affected systems. NVD lists macOS X versions through 10.12.1 as vulnerable, and the issue was publicly disclosed on 2017-02-20. The impact is availability-only denial of service, with local attack conditions and user interaction required.

Vendor
Apple
Product
CVE-2016-7605
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

Mac administrators, endpoint security teams, and users or fleet owners running macOS 10.12.1 or earlier should care most, especially where untrusted apps can be installed or launched.

Technical summary

The NVD record classifies this as CWE-476 (NULL Pointer Dereference) with CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. In practical terms, a crafted app can cause the Bluetooth component to dereference a null pointer and terminate or destabilize the affected process/system. The vulnerable macOS range in NVD is up to and including 10.12.1, which aligns with the Apple reference advisory for macOS before 10.12.2.

Defensive priority

Medium — prioritize patching affected macOS systems, but this is an availability-only issue rather than a code-execution or data-exposure flaw.

Recommended defensive actions

  • Upgrade affected Macs to macOS 10.12.2 or later.
  • Inventory devices running macOS 10.12.1 or earlier and prioritize them for remediation.
  • Limit installation and execution of untrusted apps on managed endpoints.
  • Review Apple advisory HT207423 and the NVD record for the affected version scope and update guidance.

Evidence notes

The summary is based on the supplied NVD record and Apple vendor reference. NVD lists the vulnerable CPE as macOS X up to version 10.12.1 and assigns CWE-476 with a CVSS vector indicating local access, required user interaction, and high availability impact. The Apple vendor advisory referenced in the corpus is https://support.apple.com/HT207423.

Official resources

Publicly disclosed on 2017-02-20 per the supplied CVE and source timeline; the NVD record was modified later on 2026-05-13, which should not be treated as the issue date.