CVE-2019-8854

7.5 HIGH

📋 TL;DR

This vulnerability allows passive tracking of Apple devices via their Wi-Fi MAC addresses, which were broadcasted in probe requests. It affects users of older Apple operating systems who haven't updated to patched versions.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • watchOS
  • tvOS
Versions: Versions before macOS Catalina 10.15, iOS 13, watchOS 6, tvOS 13
Operating Systems: macOS, iOS, watchOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with Wi-Fi enabled are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent location tracking of individuals across different Wi-Fi networks, enabling physical surveillance and privacy violations.

🟠

Likely Case

Retail stores, advertisers, or malicious actors tracking device presence and movement patterns for profiling or targeted attacks.

🟢

If Mitigated

Minimal impact as MAC address randomization prevents unique device identification across sessions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only passive Wi-Fi monitoring equipment, no active interaction with target devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Catalina 10.15, iOS 13, watchOS 6, tvOS 13

Vendor Advisory: https://support.apple.com/en-us/HT210604

Restart Required: Yes

Instructions:

1. Open System Settings > General > Software Update. 2. Install available updates. 3. Restart device when prompted.

🔧 Temporary Workarounds

Disable Wi-Fi

all

Turn off Wi-Fi when not in use to prevent MAC address broadcasting.

Use Private Wi-Fi Address

all

Enable MAC address randomization feature if available in older OS versions.

🧯 If You Can't Patch

  • Disable Wi-Fi when in public/untrusted locations
  • Use cellular data or VPN when connecting to public Wi-Fi networks

🔍 How to Verify

Check if Vulnerable:

Check OS version in Settings > General > About. If version is earlier than patched versions listed, device is vulnerable.

Check Version:

sw_vers (macOS), settings command varies by device

Verify Fix Applied:

Confirm OS version matches or exceeds patched versions: macOS 10.15+, iOS 13+, watchOS 6+, tvOS 13+.

📡 Detection & Monitoring

Log Indicators:

  • Not applicable - passive tracking leaves no device logs

Network Indicators:

  • Wi-Fi sniffing devices detecting consistent MAC addresses from Apple devices

SIEM Query:

Not applicable for endpoint detection

🔗 References

📤 Share & Export