CVE-2020-9789
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code by tricking users into processing a maliciously crafted image. It affects Apple devices and software including iOS, macOS, tvOS, watchOS, and Windows versions of iTunes and iCloud. Successful exploitation could give attackers full control of the affected system.
💻 Affected Systems
- iOS
- iPadOS
- macOS Catalina
- tvOS
- watchOS
- iTunes for Windows
- iCloud for Windows
📦 What is this software?
Icloud by Apple
Icloud by Apple
Ipados by Apple
Itunes by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Malware installation, credential theft, or unauthorized access to sensitive data on the compromised device.
If Mitigated
Limited impact if systems are fully patched, network segmentation is in place, and user education prevents malicious image processing.
🎯 Exploit Status
Exploitation requires user interaction to process a malicious image, but no authentication is needed once the image is processed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.5, iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19
Vendor Advisory: https://support.apple.com/HT211168
Restart Required: Yes
Instructions:
1. Open Settings (iOS/iPadOS/watchOS) or System Preferences (macOS). 2. Navigate to Software Update. 3. Download and install the latest update. 4. For Windows software, open iTunes or iCloud and check for updates in the Help menu.
🔧 Temporary Workarounds
Disable automatic image processing
allConfigure email clients and web browsers to not automatically download or process images from untrusted sources.
User education and policies
allTrain users to avoid opening images from unknown sources and implement policies restricting image processing from untrusted locations.
🧯 If You Can't Patch
- Implement network segmentation to isolate vulnerable systems from critical assets
- Deploy application allowlisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check the current version against affected versions listed in the Apple security advisories.
Check Version:
iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac. Windows software: Help > About in iTunes/iCloud.
Verify Fix Applied:
Verify the installed version matches or exceeds the patched versions: iOS/iPadOS 13.5+, macOS Catalina 10.15.5+, tvOS 13.4.5+, watchOS 6.2.5+, iTunes 12.10.7+, iCloud for Windows 11.2+ or 7.19+.
📡 Detection & Monitoring
Log Indicators:
- Unexpected process crashes in image processing services
- Suspicious file creation or execution following image file access
Network Indicators:
- Unusual outbound connections from devices after image processing
- Downloads of suspicious image files from untrusted sources
SIEM Query:
source="apple-device-logs" AND (event="process_crash" AND process="image*" OR event="file_execution" AND file_type="image")
🔗 References
- https://support.apple.com/HT211168
- https://support.apple.com/HT211170
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181
- https://support.apple.com/HT211168
- https://support.apple.com/HT211170
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181