CVE-2020-9800
📋 TL;DR
This is a type confusion vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. Attackers can exploit this by tricking users into visiting specially crafted websites, potentially taking full control of affected devices. It affects iOS, iPadOS, tvOS, watchOS, Safari, iTunes for Windows, and iCloud for Windows.
💻 Affected Systems
- iOS
- iPadOS
- tvOS
- watchOS
- Safari
- iTunes for Windows
- iCloud for Windows
📦 What is this software?
Icloud by Apple
Icloud by Apple
Ipados by Apple
Itunes by Apple
Safari by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the device, enabling data theft, surveillance, ransomware deployment, or persistence establishment.
Likely Case
Drive-by compromise where users visiting malicious websites get malware installed, leading to credential theft, data exfiltration, or device enrollment in botnets.
If Mitigated
Limited impact with proper patching and security controls, potentially only affecting isolated browser sessions without system-wide compromise.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious website) but no authentication. Type confusion vulnerabilities in WebKit have historically been weaponized in exploit chains.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.5, iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7, iCloud for Windows 11.2/7.19
Vendor Advisory: https://support.apple.com/HT211168
Restart Required: Yes
Instructions:
1. For Apple devices: Go to Settings > General > Software Update and install latest update. 2. For Safari on macOS: Use App Store updates. 3. For iTunes/iCloud on Windows: Use Apple Software Update or download from apple.com.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily disable JavaScript in Safari/WebKit browsers to prevent exploitation
Safari: Safari > Preferences > Security > uncheck 'Enable JavaScript'
Use Alternative Browser
allUse browsers not based on WebKit engine (Chrome, Firefox, Edge) until patched
🧯 If You Can't Patch
- Implement network filtering to block known malicious domains and restrict web browsing
- Deploy application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check current version against affected versions list. For iOS: Settings > General > About > Version. For Safari: Safari > About Safari.
Check Version:
iOS: Settings > General > About > Version; macOS: Safari > About Safari; Windows: iTunes > Help > About iTunes
Verify Fix Applied:
Confirm version matches or exceeds patched versions listed in Apple advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual process spawning from Safari/WebKit processes
- Crash reports from WebKit processes with memory corruption signatures
Network Indicators:
- Connections to suspicious domains from WebKit processes
- Unusual outbound traffic patterns following web browsing
SIEM Query:
process_name:Safari OR process_name:WebKit AND (event_type:process_creation OR event_type:crash)
🔗 References
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181