CVE-2020-9802
📋 TL;DR
This is a critical logic vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. Attackers can craft malicious websites that exploit this flaw to run arbitrary code on affected devices. The vulnerability affects multiple Apple platforms including iOS, iPadOS, tvOS, watchOS, Safari, and iCloud/ITunes for Windows.
💻 Affected Systems
- iOS
- iPadOS
- tvOS
- watchOS
- Safari
- iTunes for Windows
- iCloud for Windows
📦 What is this software?
Icloud by Apple
Icloud by Apple
Ipados by Apple
Itunes by Apple
Safari by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary code with the privileges of the current user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Drive-by compromise where users visit malicious websites leading to malware installation, credential theft, or device takeover.
If Mitigated
Limited impact with proper network segmentation, application whitelisting, and user education preventing access to malicious sites.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious website) but no authentication. The logic issue suggests moderate technical complexity for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.5, iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7, iCloud for Windows 11.2/7.19
Vendor Advisory: https://support.apple.com/HT211168
Restart Required: Yes
Instructions:
1. For iOS/iPadOS: Go to Settings > General > Software Update and install iOS 13.5 or later. 2. For macOS: Update Safari via System Preferences > Software Update. 3. For Windows: Update iTunes via Microsoft Store or Apple Software Update. 4. For iCloud for Windows: Update via Microsoft Store or Apple Software Update. 5. Restart devices after installation.
🔧 Temporary Workarounds
Browser Restrictions
allRestrict browser usage to trusted sites only and implement web content filtering.
Network Segmentation
allSegment affected devices from critical network resources to limit lateral movement.
🧯 If You Can't Patch
- Implement strict web content filtering to block access to untrusted websites
- Deploy application whitelisting to prevent execution of unauthorized binaries
🔍 How to Verify
Check if Vulnerable:
Check current version against affected versions list. For iOS: Settings > General > About > Version. For Safari: Safari > About Safari.
Check Version:
iOS: Settings > General > About; macOS: Safari > About Safari; Windows: Help > About in iTunes/iCloud
Verify Fix Applied:
Verify version numbers match or exceed patched versions: iOS/iPadOS 13.5+, tvOS 13.4.5+, watchOS 6.2.5+, Safari 13.1.1+, iTunes 12.10.7+, iCloud for Windows 11.2/7.19+.
📡 Detection & Monitoring
Log Indicators:
- Unexpected browser crashes
- Suspicious process creation from browser processes
- Unusual network connections from browser
Network Indicators:
- Connections to known malicious domains
- Unusual outbound traffic patterns from affected devices
SIEM Query:
source="browser_logs" AND (event="crash" OR process="unexpected_executable")
🔗 References
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181