PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-7761 Apple CVE debrief

CVE-2016-7761 is a medium-severity local information-disclosure issue in Apple macOS WiFi handling. According to the NVD record, macOS versions through 10.12.1 are affected, and a local user could obtain sensitive network-configuration information by leveraging global storage. Apple’s advisory is referenced by NVD, and the issue is listed as fixed in macOS 10.12.2.

Vendor
Apple
Product
CVE-2016-7761
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

MacOS administrators, endpoint security teams, and users of affected macOS systems before 10.12.2 should care most, especially in shared or multi-user environments where a local account could expose network-configuration details.

Technical summary

The NVD entry classifies the issue as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) with CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The vulnerable component is identified as WiFi, and the affected platform is macOS before 10.12.2. The consequence described is local access to sensitive network-configuration information via global storage, with no integrity or availability impact indicated in the provided data.

Defensive priority

Moderate. The bug requires local access and low privileges, and it is limited to confidentiality impact, but the information exposed may still be useful for internal reconnaissance or privacy-sensitive environments.

Recommended defensive actions

  • Upgrade affected macOS systems to 10.12.2 or later.
  • Review any shared or multi-user Macs that may still be on 10.12.1 or earlier.
  • Limit unnecessary local account access on systems that cannot be updated immediately.
  • Treat the WiFi/network configuration data on affected systems as potentially exposed until patched.
  • Use the Apple vendor advisory and NVD record to confirm affected versions and remediation status.

Evidence notes

The supplied NVD metadata states: macOS before 10.12.2 is affected; the vulnerable component is WiFi; local users can obtain sensitive network-configuration information by leveraging global storage. NVD also lists CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N and CWE-200. The Apple support URL is referenced in NVD as the vendor advisory, but no advisory body text was supplied here.

Official resources

Publicly disclosed in the CVE record on 2017-02-20, with Apple’s advisory referenced by NVD.