CVE-2020-9917

7.5 HIGH

📋 TL;DR

This vulnerability allows a remote attacker to cause a denial of service on affected Apple iOS and iPadOS devices. The specific attack vector is not publicly disclosed, but it could potentially crash services or the entire device. All users running vulnerable iOS/iPadOS versions are affected.

💻 Affected Systems

Products:
  • iPhone
  • iPad
Versions: iOS/iPadOS versions before 13.6
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected iOS/iPadOS versions are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring reboot, potentially disrupting critical mobile operations or services

🟠

Likely Case

Service disruption or application crashes affecting user experience

🟢

If Mitigated

Minimal impact with proper network segmentation and updated devices

🌐 Internet-Facing: MEDIUM - Remote exploitation possible but requires specific conditions
🏢 Internal Only: LOW - Primarily affects mobile devices, not typically internal infrastructure

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Apple has not disclosed technical details, but remote unauthenticated exploitation is indicated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 13.6, iPadOS 13.6

Vendor Advisory: https://support.apple.com/HT211288

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Download and install iOS 13.6 or later. 5. Device will restart automatically.

🔧 Temporary Workarounds

Network segmentation

all

Restrict network access to affected devices from untrusted networks

Disable unnecessary services

all

Turn off unused network services and features on iOS devices

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments
  • Implement strict firewall rules to limit inbound connections

🔍 How to Verify

Check if Vulnerable:

Check iOS version in Settings > General > About > Version

Check Version:

Not applicable - check via iOS Settings interface

Verify Fix Applied:

Verify version shows 13.6 or higher in Settings > General > About

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Service crash logs
  • Connection attempts from unusual sources

Network Indicators:

  • Unusual traffic patterns to iOS devices
  • Connection attempts on uncommon ports

SIEM Query:

source="ios_device" AND (event="crash" OR event="reboot")

🔗 References

📤 Share & Export