CIS Logo
tagline: Confidence in the Connected World

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER:

2020-071

DATE(S) ISSUED:

05/27/2020

OVERVIEW:

Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution.

  • Apple iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.
  • iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.
  • watchOS is the mobile operating system for the Apple Watch and is based on the iOS operating system.

Successful exploitation of these vulnerabilities could result in arbitrary code execution. An attacker could then execute code with privileges given to the mail application, delete emails, crash the mail application, and cause device slowdowns.

THREAT INTELLIGENCE:

ZecOps has reported these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Apple iOS 7.0 through IOS 12.4.1
  • Apple iOS 13.0 through IOS 13.4.1
  • iPadOS 13.1.0 through iPadOS 13.4.0
  • watchOS prior to 5.3.7
  • watchOS 6.0 through 6.2.0

RISK:

Government:
  • Large and medium government entities: HIGH
  • Small government entities: HIGH
Businesses:
  • Large and medium business entities: HIGH
  • Small business entities: HIGH
Home Users:
HIGH

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution. Details of the vulnerabilities are as follows:

  • Out-of-bounds write error that could cause arbitrary code execution. (CVE-2020-9818)
  • Heap-based buffer-overflow vulnerability that could cause arbitrary code execution. (CVE-2020-9819)

Successful exploitation of these vulnerabilities could result in arbitrary code execution. An attacker could then execute code with privileges given to the mail application, delete emails, crash the mail application, and cause device slowdowns.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Install the updates provided by Apple immediately after appropriate testing.
  • Remind users not to download, accept, or execute files from un-trusted or unknown sources.
  • Remind users not to visit untrusted websites or follow links provided by unknown or un-trusted sources.

REFERENCES:

Get Email Updates When Cyber Threats Like This Arise

Arrow Subscribe to Advisories

Related Resources



Arrow CIS Control 3: Continuous Vulnerability Assessment and Remediation

Information Hub : Advisories


CONTROL: 1 --- ADVISORY CONTROL: 0
CONTROL: 2 --- ADVISORY CONTROL: 0

Pencil Blog post 06 Jul 2020
CONTROL: 3 --- ADVISORY CONTROL: 0
CONTROL: 4 --- ADVISORY CONTROL: 0