PatchSiren cyber security CVE debrief
CVE-2016-7761 Apple CVE debrief
CVE-2016-7761 is a medium-severity local information-disclosure issue in Apple macOS WiFi handling. According to the NVD record, macOS versions through 10.12.1 are affected, and a local user could obtain sensitive network-configuration information by leveraging global storage. Apple’s advisory is referenced by NVD, and the issue is listed as fixed in macOS 10.12.2.
- Vendor
- Apple
- Product
- CVE-2016-7761
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-20
- Advisory updated
- 2026-05-13
Who should care
MacOS administrators, endpoint security teams, and users of affected macOS systems before 10.12.2 should care most, especially in shared or multi-user environments where a local account could expose network-configuration details.
Technical summary
The NVD entry classifies the issue as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The vulnerable component is identified as WiFi, and the affected platform is macOS before 10.12.2. The consequence described is local access to sensitive network-configuration information via global storage, with no integrity or availability impact indicated in the provided data.
Defensive priority
Moderate. The bug requires local access and low privileges, and it is limited to confidentiality impact, but the information exposed may still be useful for internal reconnaissance or privacy-sensitive environments.
Recommended defensive actions
- Upgrade affected macOS systems to 10.12.2 or later.
- Review any shared or multi-user Macs that may still be on 10.12.1 or earlier.
- Limit unnecessary local account access on systems that cannot be updated immediately.
- Treat the WiFi/network configuration data on affected systems as potentially exposed until patched.
- Use the Apple vendor advisory and NVD record to confirm affected versions and remediation status.
Evidence notes
The supplied NVD metadata states: macOS before 10.12.2 is affected; the vulnerable component is WiFi; local users can obtain sensitive network-configuration information by leveraging global storage. NVD also lists CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N and CWE-200. The Apple support URL is referenced in NVD as the vendor advisory, but no advisory body text was supplied here.
Official resources
-
CVE-2016-7761 CVE record
CVE.org
-
CVE-2016-7761 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the CVE record on 2017-02-20, with Apple’s advisory referenced by NVD.