CVE-2020-29618

7.8 HIGH

📋 TL;DR

CVE-2020-29618 is an out-of-bounds read vulnerability in Apple's image processing that could allow arbitrary code execution when processing malicious images. It affects multiple Apple operating systems and iCloud for Windows. Attackers could exploit this to run malicious code on vulnerable devices.

💻 Affected Systems

Products:
  • tvOS
  • macOS
  • iOS
  • iPadOS
  • watchOS
  • iCloud for Windows
Versions: Versions before tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3, iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2
Operating Systems: Apple tvOS, Apple macOS, Apple iOS, Apple iPadOS, Apple watchOS, Windows (iCloud for Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable when processing images through system components.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining control of the device, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Application crash or limited information disclosure from memory reads, though arbitrary code execution is possible with crafted exploits.

🟢

If Mitigated

No impact if systems are patched to the fixed versions or if image processing from untrusted sources is blocked.

🌐 Internet-Facing: MEDIUM - Exploitation requires processing malicious images, which could come from web content, emails, or downloads, but requires user interaction or automated processing.
🏢 Internal Only: LOW - Same exploitation requirements apply internally; risk is primarily from external attack vectors delivering malicious content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious images that trigger the out-of-bounds read, potentially leading to code execution. No public proof-of-concept has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3, iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2

Vendor Advisory: https://support.apple.com/en-us/HT212003

Restart Required: Yes

Instructions:

1. Open Settings/System Preferences on the device. 2. Navigate to Software Update. 3. Download and install the latest available update. 4. Restart the device after installation completes.

🔧 Temporary Workarounds

Block untrusted image sources

all

Prevent processing of images from untrusted or external sources through application controls or network filtering.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code.
  • Use network segmentation to isolate vulnerable systems and monitor for suspicious image processing activity.

🔍 How to Verify

Check if Vulnerable:

Check the operating system version against the affected versions list. On Apple devices: Settings > General > About > Version. On Windows with iCloud: iCloud > Help > About iCloud.

Check Version:

On macOS: sw_vers -productVersion. On iOS/iPadOS: Settings > General > About > Version. On Windows: iCloud > Help > About iCloud.

Verify Fix Applied:

Verify the version matches or exceeds the patched versions listed in the fix information.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in image processing components
  • Unusual memory access patterns in system logs

Network Indicators:

  • Unexpected downloads of image files to vulnerable systems
  • Outbound connections from systems after image processing

SIEM Query:

Image: (process_name IN ('image processing binaries')) AND (event_type='crash' OR memory_violation='true')

🔗 References

📤 Share & Export