PatchSiren cyber security CVE debrief
CVE-2016-7667 Apple CVE debrief
CVE-2016-7667 is an Apple CoreText issue that can be triggered remotely with a crafted string and result in denial of service. The CVE description states that iOS before 10.2 and macOS before 10.12.2 are affected, while the NVD record maps vulnerable CPE ranges to iPhone OS through 10.1.1 and macOS through 10.12.1. Apple vendor advisories are referenced by NVD, and the issue was published on 2017-02-20. The practical defensive takeaway is straightforward: install the Apple security updates that move impacted devices to the fixed releases.
- Vendor
- Apple
- Product
- CVE-2016-7667
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-20
- Advisory updated
- 2026-05-13
Who should care
Apple device administrators, endpoint security teams, and anyone responsible for iPhone/iPad or macOS fleets should care most. Because the issue is network-reachable and requires no privileges or user interaction, systems that process untrusted content or are broadly exposed should be prioritized for patching.
Technical summary
The vulnerable component is CoreText, Apple’s text handling subsystem. According to the supplied CVE description, a crafted string can cause a remote denial of service on affected Apple platforms. NVD classifies the weakness as CWE-20 (improper input validation) and rates the attack vector as network-based with low complexity, no privileges required, no user interaction, and high availability impact (CVSS 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Defensive priority
High. The issue is remotely triggerable, needs no authentication or user interaction, and can disrupt availability on affected Apple devices, so remediation should be prioritized in normal patch cycles and accelerated for exposed or mission-critical fleets.
Recommended defensive actions
- Update iOS devices to 10.2 or later.
- Update macOS devices to 10.12.2 or later.
- Verify fleet inventory to find devices still on affected Apple releases.
- Use Apple vendor advisories HT207422 and HT207423 to confirm the applicable fixed builds for your environment.
- Treat the NVD version mapping as advisory metadata and validate remediation scope against Apple’s official guidance.
Evidence notes
Evidence is limited to the supplied CVE description, NVD metadata, and Apple vendor-advisory references listed in NVD. The CVE description identifies CoreText, remote denial of service, and the affected version ceilings. NVD adds the CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H and CWE-20. The record was originally published on 2017-02-20; the later 2026-05-13 modified timestamp reflects metadata updates, not the disclosure date.
Official resources
-
CVE-2016-7667 CVE record
CVE.org
-
CVE-2016-7667 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE first published on 2017-02-20. The 2026-05-13 modified timestamp is a later record update and should not be treated as the original disclosure date.