CVE-2020-9815

7.8 HIGH

📋 TL;DR

CVE-2020-9815 is an out-of-bounds read vulnerability in Apple's audio file processing that could allow arbitrary code execution when processing a malicious audio file. This affects users of iOS, iPadOS, macOS, tvOS, and watchOS who open malicious audio files. Attackers could potentially gain control of affected devices.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions before iOS 13.5, iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected versions are vulnerable when processing audio files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with attacker gaining root/system privileges and persistent access.

🟠

Likely Case

Application crash or limited code execution within the audio processing context.

🟢

If Mitigated

No impact if devices are fully patched or if malicious audio files are blocked.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious audio file from internet sources.
🏢 Internal Only: LOW - Still requires user interaction with malicious files, less likely in controlled environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious audio file. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 13.5, iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5

Vendor Advisory: https://support.apple.com/HT211168

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update on iOS/iPadOS/watchOS. 2. On macOS, go to System Preferences > Software Update. 3. On tvOS, go to Settings > System > Software Updates. 4. Download and install the latest update. 5. Restart device after installation.

🔧 Temporary Workarounds

Block suspicious audio files

all

Use email/web filtering to block potentially malicious audio attachments and downloads.

Restrict audio file processing

macOS

Use application control policies to restrict which applications can process audio files.

🧯 If You Can't Patch

  • Implement strict email/web filtering to block audio file attachments and downloads
  • Educate users to avoid opening audio files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check device version against affected versions list. On iOS/iPadOS: Settings > General > About > Version. On macOS: Apple menu > About This Mac > Overview.

Check Version:

iOS/iPadOS/watchOS: No command line. macOS: sw_vers -productVersion

Verify Fix Applied:

Verify device is running iOS 13.5+, iPadOS 13.5+, macOS 10.15.5+, tvOS 13.4.5+, or watchOS 6.2.5+.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in audio processing components
  • Unexpected audio file processing by system services

Network Indicators:

  • Downloads of audio files from suspicious sources
  • Unusual outbound connections after audio file processing

SIEM Query:

source="apple_system_logs" AND (process="coreaudiod" OR process="audio" OR event="crash") AND file_extension IN ("mp3", "aac", "m4a", "wav")

🔗 References

📤 Share & Export