CVE-2019-8660

9.8 CRITICAL

📋 TL;DR

CVE-2019-8660 is a critical memory corruption vulnerability in Apple operating systems that allows remote attackers to cause application crashes or execute arbitrary code. It affects iOS, macOS, tvOS, and watchOS devices. Attackers can exploit this without authentication to potentially take full control of affected devices.

💻 Affected Systems

Products:
  • iOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions before iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3
Operating Systems: iOS, macOS, tvOS, watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected versions are vulnerable by default; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Application crashes (denial of service) or limited code execution depending on exploit sophistication.

🟢

If Mitigated

No impact if patched; unpatched systems remain vulnerable to remote exploitation.

🌐 Internet-Facing: HIGH - Remote attackers can exploit without authentication over network.
🏢 Internal Only: HIGH - Internal attackers can also exploit this vulnerability locally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities typically require some exploit development skill but are frequently weaponized once details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3

Vendor Advisory: https://support.apple.com/HT210346

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update on iOS/watchOS/tvOS or Apple menu > About This Mac > Software Update on macOS. 2. Download and install the latest update. 3. Restart the device when prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable devices from untrusted networks to reduce attack surface.

Application Whitelisting

macOS

Restrict which applications can run to prevent arbitrary code execution.

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments with strict firewall rules
  • Implement application control/whitelisting to limit potential damage from exploitation

🔍 How to Verify

Check if Vulnerable:

Check current OS version against affected versions list.

Check Version:

iOS/watchOS/tvOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version.

Verify Fix Applied:

Verify OS version is equal to or newer than patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes
  • Memory access violation logs
  • Process creation from unexpected sources

Network Indicators:

  • Unusual network connections from Apple devices
  • Exploit kit traffic patterns

SIEM Query:

source="apple-devices" AND (event_type="crash" OR event_type="memory_violation")

🔗 References

📤 Share & Export