CVE-2020-9813
📋 TL;DR
This is a memory corruption vulnerability in Apple operating systems that allows a malicious application to execute arbitrary code with kernel privileges. It affects iOS, iPadOS, macOS, tvOS, and watchOS. The vulnerability stems from a logic issue in state management that was addressed in security updates.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- tvOS
- watchOS
📦 What is this software?
Ipados by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with kernel-level privileges, allowing attackers to install persistent malware, bypass security controls, access all data, and control the device.
Likely Case
Malicious apps from untrusted sources could gain kernel privileges to steal sensitive data, install backdoors, or perform other malicious activities.
If Mitigated
With proper app vetting and security controls, risk is limited to targeted attacks requiring user interaction to install malicious apps.
🎯 Exploit Status
Exploitation requires user interaction to install a malicious application. No public exploit code has been disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.5, iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5
Vendor Advisory: https://support.apple.com/HT211168
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the available update. 4. Restart the device when prompted.
🔧 Temporary Workarounds
Restrict App Installation
allOnly install apps from the official App Store to prevent malicious applications from being installed.
🧯 If You Can't Patch
- Implement strict application whitelisting to prevent installation of unauthorized applications.
- Deploy endpoint detection and response (EDR) solutions to monitor for suspicious kernel-level activity.
🔍 How to Verify
Check if Vulnerable:
Check the operating system version against the affected versions listed in the affected_systems section.
Check Version:
iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac. tvOS: Settings > General > About. watchOS: Watch app on iPhone > General > About.
Verify Fix Applied:
Verify the device is running iOS 13.5+, iPadOS 13.5+, macOS Catalina 10.15.5+, tvOS 13.4.5+, or watchOS 6.2.5+.
📡 Detection & Monitoring
Log Indicators:
- Unexpected kernel panics or crashes
- Suspicious application installation events
- Unusual privilege escalation attempts
Network Indicators:
- Connections to known malicious domains from kernel processes
- Unusual outbound traffic patterns
SIEM Query:
source="apple_system_logs" AND (event="kernel_panic" OR process="kernel_task") AND severity="critical"