PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-7664 Apple CVE debrief

CVE-2016-7664 is a low-severity Apple iOS information disclosure issue involving the Accessibility component on the lockscreen. According to the supplied record, a physically proximate attacker could leverage excessive lockscreen options to obtain sensitive photo and contact information on affected devices running iOS before 10.2.

Vendor
Apple
Product
CVE-2016-7664
CVSS
LOW 2.4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

Organizations and individuals that managed or used Apple iOS devices before 10.2, especially where devices may be left unattended or accessible to nearby people. Mobile security, endpoint management, and help desk teams should also care because the issue involves lockscreen exposure of user data.

Technical summary

The supplied source corpus describes an issue in iOS Accessibility handling that allowed more lockscreen options than intended, creating an information disclosure path. The impact is limited to confidentiality: sensitive photo and contact information may be exposed. NVD maps the weakness to CWE-200 and classifies the attack vector as physical proximity (AV:P), consistent with the need for an attacker near the device. The record also lists vulnerable iPhone OS versions through 10.1.1, while the CVE description states iOS before 10.2; both point to pre-10.2 devices being affected.

Defensive priority

Medium for exposed or unmanaged legacy iOS devices; otherwise low. The CVSS score is 2.4 (LOW), but it still matters for privacy-sensitive environments or devices likely to be accessed physically by unauthorized people.

Recommended defensive actions

  • Update affected Apple devices to iOS 10.2 or later, using the vendor guidance referenced in the Apple advisory.
  • Review lockscreen and Accessibility-related settings on deployed devices to minimize information exposed without unlock.
  • Apply mobile device management policies that reduce local data exposure on older devices that cannot be updated.
  • If legacy devices remain in service, treat them as higher-risk for shoulder-surfing or hands-on access scenarios and restrict physical access accordingly.
  • Use the Apple vendor advisory and NVD record to confirm affected version scope before remediation planning.

Evidence notes

The CVE description states that iOS before 10.2 is affected and that physically proximate attackers could obtain sensitive photo and contact information via excessive lockscreen options in Accessibility. NVD further classifies the weakness as CWE-200 and lists a vulnerable iPhone OS range ending at 10.1.1, which is slightly narrower than the description but consistent with pre-10.2 exposure. Published and modified dates are taken from the supplied CVE/NVD record and should not be treated as incident dates.

Official resources

Publicly disclosed in the supplied CVE record on 2017-02-20. The record was later modified on 2026-05-13; that modified timestamp reflects catalog updates, not the underlying vulnerability date.