CVE-2020-9807
📋 TL;DR
This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. It affects iOS, iPadOS, tvOS, watchOS, Safari, iTunes for Windows, and iCloud for Windows. Attackers can exploit this by tricking users into visiting malicious websites.
💻 Affected Systems
- iOS
- iPadOS
- tvOS
- watchOS
- Safari
- iTunes for Windows
- iCloud for Windows
📦 What is this software?
Icloud by Apple
Icloud by Apple
Ipados by Apple
Itunes by Apple
Safari by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining complete control over the device, enabling data theft, surveillance, ransomware deployment, or persistence establishment.
Likely Case
Drive-by compromise where users visiting malicious websites get malware installed, leading to credential theft, data exfiltration, or device enrollment in botnets.
If Mitigated
No impact if devices are fully patched and users avoid suspicious websites; limited impact if network filtering blocks malicious domains.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious website) but no authentication. Memory corruption vulnerabilities in WebKit are frequently exploited in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.5, iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19
Vendor Advisory: https://support.apple.com/HT211168
Restart Required: Yes
Instructions:
1. Update iOS/iPadOS: Settings > General > Software Update. 2. Update tvOS: Settings > System > Software Updates. 3. Update watchOS: iPhone Watch app > General > Software Update. 4. Update Safari: App Store > Updates. 5. Update iTunes/iCloud for Windows: Open application > Help > Check for Updates.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents execution of malicious JavaScript that could trigger the vulnerability
iOS/iPadOS: Settings > Safari > Advanced > JavaScript (toggle off)
Safari: Safari > Preferences > Security > Enable JavaScript (uncheck)
Use Alternative Browser
allSwitch to browsers not using WebKit engine (Chrome, Firefox on iOS)
🧯 If You Can't Patch
- Deploy web filtering to block known malicious domains and suspicious JavaScript content
- Implement application allowlisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check software version against affected versions list; if below patched versions, device is vulnerable.
Check Version:
iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari; Windows: iTunes > Help > About iTunes or iCloud > Help > About iCloud
Verify Fix Applied:
Confirm software version matches or exceeds patched versions listed in fix_official section.
📡 Detection & Monitoring
Log Indicators:
- Unusual process crashes in WebKit processes
- Suspicious JavaScript execution patterns in web logs
- Unexpected network connections from browser processes
Network Indicators:
- Connections to known malicious domains hosting exploit code
- Unusual JavaScript payloads in HTTP traffic
- Beaconing to command and control servers
SIEM Query:
source="web_proxy" AND (url="*malicious-domain*" OR js_content="*exploit_pattern*")
🔗 References
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211178
- https://support.apple.com/HT211179
- https://support.apple.com/HT211181