CVE-2020-9868
📋 TL;DR
This vulnerability allows an attacker to impersonate trusted websites by exploiting a certificate validation flaw in administrator-added certificates. It affects Apple devices running vulnerable versions of iOS, iPadOS, macOS, tvOS, and watchOS. Attackers could perform man-in-the-middle attacks against users of affected devices.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- tvOS
- watchOS
📦 What is this software?
Ipados by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of encrypted communications, allowing attackers to intercept and modify sensitive data including passwords, financial information, and authentication tokens.
Likely Case
Successful man-in-the-middle attacks against users visiting websites, potentially leading to credential theft and session hijacking.
If Mitigated
Limited impact with proper network segmentation and certificate management controls, though risk remains for mobile devices on untrusted networks.
🎯 Exploit Status
Exploitation requires the attacker to have a certificate with shared key material and the ability to perform man-in-the-middle attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.6, iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8
Vendor Advisory: https://support.apple.com/kb/HT211288
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted.
🔧 Temporary Workarounds
Remove administrator certificates
allRemove any administrator-added certificates that are not absolutely necessary for operations.
For iOS/iPadOS: Settings > General > Profiles & Device Management > Remove unwanted profiles
For macOS: Keychain Access > System > Certificates > Delete unwanted certificates
Network segmentation
allSegment networks to limit exposure of vulnerable devices to untrusted networks.
🧯 If You Can't Patch
- Implement strict certificate management policies and audit all administrator-added certificates
- Use VPN connections for all network traffic from vulnerable devices
🔍 How to Verify
Check if Vulnerable:
Check device version against affected versions list. For iOS/iPadOS: Settings > General > About > Version. For macOS: Apple menu > About This Mac > macOS version.
Check Version:
For macOS: sw_vers -productVersion. For iOS/iPadOS: Settings app > General > About > Version.
Verify Fix Applied:
Verify device is running iOS 13.6+, iPadOS 13.6+, macOS Catalina 10.15.6+, tvOS 13.4.8+, or watchOS 6.2.8+.
📡 Detection & Monitoring
Log Indicators:
- Unexpected certificate validation failures
- SSL/TLS handshake anomalies
- Certificate chain validation errors
Network Indicators:
- Unusual certificate authorities in TLS connections
- SSL/TLS interception attempts
- Certificate pinning failures
SIEM Query:
ssl.certificate.issuer_dn contains "unexpected_ca" OR ssl.handshake.failed = true
🔗 References
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211289
- https://support.apple.com/kb/HT211290
- https://support.apple.com/kb/HT211291
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211289
- https://support.apple.com/kb/HT211290
- https://support.apple.com/kb/HT211291