CVE-2020-9813

7.8 HIGH

📋 TL;DR

This is a memory corruption vulnerability in Apple operating systems that allows a malicious application to execute arbitrary code with kernel privileges. It affects iOS, iPadOS, macOS, tvOS, and watchOS. The vulnerability stems from a logic issue in state management that was addressed in security updates.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions prior to iOS 13.5, iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires a malicious application to be installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level privileges, allowing attackers to install persistent malware, bypass security controls, access all data, and control the device.

🟠

Likely Case

Malicious apps from untrusted sources could gain kernel privileges to steal sensitive data, install backdoors, or perform other malicious activities.

🟢

If Mitigated

With proper app vetting and security controls, risk is limited to targeted attacks requiring user interaction to install malicious apps.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to install a malicious application. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 13.5, iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5

Vendor Advisory: https://support.apple.com/HT211168

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the available update. 4. Restart the device when prompted.

🔧 Temporary Workarounds

Restrict App Installation

all

Only install apps from the official App Store to prevent malicious applications from being installed.

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent installation of unauthorized applications.
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious kernel-level activity.

🔍 How to Verify

Check if Vulnerable:

Check the operating system version against the affected versions listed in the affected_systems section.

Check Version:

iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac. tvOS: Settings > General > About. watchOS: Watch app on iPhone > General > About.

Verify Fix Applied:

Verify the device is running iOS 13.5+, iPadOS 13.5+, macOS Catalina 10.15.5+, tvOS 13.4.5+, or watchOS 6.2.5+.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected kernel panics or crashes
  • Suspicious application installation events
  • Unusual privilege escalation attempts

Network Indicators:

  • Connections to known malicious domains from kernel processes
  • Unusual outbound traffic patterns

SIEM Query:

source="apple_system_logs" AND (event="kernel_panic" OR process="kernel_task") AND severity="critical"

🔗 References

📤 Share & Export