CVE-2020-9859

7.8 HIGH

📋 TL;DR

This vulnerability allows a malicious application to execute arbitrary code with kernel privileges on Apple devices, potentially gaining full system control. It affects iOS, iPadOS, macOS, tvOS, and watchOS before specific patched versions. The issue involves memory handling that could be exploited to cause memory consumption issues leading to privilege escalation.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions before iOS 13.5.1, iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level access, allowing attackers to install persistent malware, steal sensitive data, or disable security controls.

🟠

Likely Case

Targeted attacks against specific users or organizations to gain elevated privileges and access to protected system resources.

🟢

If Mitigated

Limited impact if devices are fully patched and running with standard security configurations and app restrictions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to install/run a malicious application. CISA lists this as known exploited vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 13.5.1, iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6

Vendor Advisory: https://support.apple.com/HT211214

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Download and install available updates. 4. Restart device when prompted.

🔧 Temporary Workarounds

Restrict App Installation

all

Only allow installation of apps from trusted sources like Apple App Store

Settings > General > Device Management > Trust Enterprise Developer (for enterprise devices only)

Enable Automatic Updates

all

Configure devices to automatically install security updates

Settings > General > Software Update > Automatic Updates > Enable 'Download iOS Updates' and 'Install iOS Updates'

🧯 If You Can't Patch

  • Isolate affected devices from critical networks and sensitive data
  • Implement strict application control policies to prevent installation of untrusted applications

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Version

Check Version:

iOS/iPadOS: Settings > General > About > Version; macOS: About This Mac > Overview; tvOS: Settings > General > About; watchOS: Settings > General > About

Verify Fix Applied:

Verify version is equal to or greater than: iOS/iPadOS 13.5.1, macOS 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6

📡 Detection & Monitoring

Log Indicators:

  • Unexpected kernel memory allocation patterns
  • Processes running with unexpected kernel privileges
  • Application crash logs showing memory exhaustion

Network Indicators:

  • Unusual outbound connections from system processes
  • Traffic to known malicious domains from elevated processes

SIEM Query:

source="apple_system_logs" AND (event="kernel_memory_exhaustion" OR process_privilege="kernel")

🔗 References

📤 Share & Export