CVE-2020-9900
📋 TL;DR
This vulnerability allows a local attacker to bypass symlink path validation, potentially gaining elevated privileges on affected Apple devices. It affects iOS, iPadOS, macOS, tvOS, and watchOS before specific patched versions. The attacker must already have local access to the system.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- tvOS
- watchOS
📦 What is this software?
Ipados by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to root/system-level access, allowing complete system compromise and persistence.
Likely Case
Local user gains elevated privileges beyond their normal permissions, potentially accessing sensitive data or modifying system files.
If Mitigated
Attack fails due to proper path sanitization in patched systems or lack of local access.
🎯 Exploit Status
Requires local access and knowledge of symlink manipulation. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.6, iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8
Vendor Advisory: https://support.apple.com/kb/HT211288
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted.
🔧 Temporary Workarounds
Restrict local user access
allLimit local user accounts and implement least privilege principles to reduce attack surface.
🧯 If You Can't Patch
- Implement strict access controls and monitor for suspicious local activity.
- Segment networks to limit lateral movement if local account is compromised.
🔍 How to Verify
Check if Vulnerable:
Check system version against affected versions list. On macOS: System Preferences > About This Mac. On iOS/iPadOS: Settings > General > About.
Check Version:
macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version
Verify Fix Applied:
Verify system version is equal to or newer than patched versions listed in fix_official.patch_version.
📡 Detection & Monitoring
Log Indicators:
- Unusual symlink creation/modification events
- Privilege escalation attempts in system logs
Network Indicators:
- Not applicable - local-only vulnerability
SIEM Query:
source="*system.log*" AND ("symlink" OR "privilege") AND ("escalation" OR "elevation")
🔗 References
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211289
- https://support.apple.com/kb/HT211290
- https://support.apple.com/kb/HT211291
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211289
- https://support.apple.com/kb/HT211290
- https://support.apple.com/kb/HT211291