CVE-2020-9910
📋 TL;DR
This vulnerability allows a malicious attacker with arbitrary read/write capability to bypass Pointer Authentication mechanisms in Apple operating systems. This affects iOS, iPadOS, tvOS, watchOS, Safari, iTunes for Windows, and iCloud for Windows. The bypass could enable further exploitation of affected systems.
💻 Affected Systems
- iOS
- iPadOS
- tvOS
- watchOS
- Safari
- iTunes for Windows
- iCloud for Windows
📦 What is this software?
Icloud by Apple
Icloud by Apple
Ipados by Apple
Itunes by Apple
Safari by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing arbitrary code execution with kernel privileges, potentially leading to data theft, device takeover, or persistent backdoor installation.
Likely Case
Privilege escalation enabling attackers to bypass security controls and execute malicious code with elevated permissions.
If Mitigated
Limited impact if systems are fully patched and have additional security controls like application sandboxing and network segmentation.
🎯 Exploit Status
Requires existing arbitrary read/write capability, making this a secondary exploitation technique rather than a primary attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 13.6, iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8, iCloud for Windows 11.3/7.20
Vendor Advisory: https://support.apple.com/HT211288
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install available updates. 4. For Windows applications, update through Apple Software Update or download from Apple website.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices from critical networks to limit potential lateral movement.
Application Control
allRestrict installation of untrusted applications to reduce attack surface.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable devices
- Deploy endpoint detection and response (EDR) solutions to monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check current version against patched versions listed in Apple advisories.
Check Version:
iOS/iPadOS: Settings > General > About > Version; Windows: Help > About in respective applications
Verify Fix Applied:
Confirm device/application version matches or exceeds patched versions: iOS/iPadOS ≥13.6, tvOS ≥13.4.8, watchOS ≥6.2.8, Safari ≥13.1.2, iTunes ≥12.10.8, iCloud for Windows ≥11.3/7.20.
📡 Detection & Monitoring
Log Indicators:
- Unexpected process execution with elevated privileges
- Memory access violations
- Pointer authentication failures
Network Indicators:
- Unusual outbound connections from Apple devices
- Traffic to known malicious domains
SIEM Query:
source="apple-devices" AND (event_type="privilege_escalation" OR event_type="memory_violation")
🔗 References
- https://support.apple.com/HT211288
- https://support.apple.com/HT211290
- https://support.apple.com/HT211291
- https://support.apple.com/HT211292
- https://support.apple.com/HT211293
- https://support.apple.com/HT211294
- https://support.apple.com/HT211295
- https://support.apple.com/HT211288
- https://support.apple.com/HT211290
- https://support.apple.com/HT211291
- https://support.apple.com/HT211292
- https://support.apple.com/HT211293
- https://support.apple.com/HT211294
- https://support.apple.com/HT211295