PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-2365 Apple CVE debrief

CVE-2017-2365 is a medium-severity WebKit information-disclosure issue affecting Apple platforms and related WebKit builds. A remote attacker can use a crafted website to bypass the Same Origin Policy and read sensitive information. The NVD record maps the issue to iOS before 10.2.1, Safari before 10.0.3, tvOS before 10.1.1, and WebKitGTK+ before 2.16.3.

Vendor
Apple
Product
CVE-2017-2365
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

Security teams and administrators managing affected iPhone/iPad, Safari, and tvOS deployments should care most, especially where older versions remain in use. Users who browse untrusted sites on impacted devices are also at risk because the issue is triggered remotely through web content.

Technical summary

NVD rates the issue CVSS 3.0 6.5 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) and lists CWE-200. The core impact is confidentiality: a crafted website can cause WebKit to bypass same-origin protections and expose sensitive data. The official record and Apple advisories indicate fixes were released for the affected version ranges.

Defensive priority

Medium. Patch quickly if any affected Apple or WebKit versions remain deployed, because the flaw is remotely reachable and can leak data after user interaction with a malicious site.

Recommended defensive actions

  • Update iOS devices to 10.2.1 or later, Safari to 10.0.3 or later, and tvOS to 10.1.1 or later, or apply the equivalent vendor fixes listed in the Apple advisories.
  • Inventory legacy Apple and WebKit-based systems to confirm no vulnerable versions remain exposed to normal browsing.
  • Limit access to untrusted or high-risk websites on systems that cannot be updated immediately.
  • Review Apple security advisories and internal patch records to verify the remediation was applied across all managed fleets.

Evidence notes

This debrief is based on the official NVD record and the Apple vendor advisories listed in the source corpus. The NVD description states the flaw allows a remote attacker to bypass the Same Origin Policy and obtain sensitive information via a crafted website; the CPE mappings provide the affected version cutoffs. The record was published on 2017-02-20 and last modified on 2026-05-13.

Official resources

Publicly disclosed in the official NVD record on 2017-02-20. The NVD record was last modified on 2026-05-13; that modified date is not the vulnerability creation or release date.