Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

ITS Advisory Number: 
2020-071
Date(s) Issued: 
Wednesday, May 27, 2020
Subject: 
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Overview: 

Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution. 

  • Apple iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.

  • iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.

  • watchOS is the mobile operating system for the Apple Watch and is based on the iOS operating system. 

Successful exploitation of these vulnerabilities could result in arbitrary code execution. An attacker could then execute code with privileges given to the mail application, delete emails, crash the mail application, and cause device slowdowns.

 

THREAT INTELLIGENCE:

ZecOps has reported these vulnerabilities being exploited in the wild.

 

Systems Affected: 
  • Apple iOS 7.0 through IOS 12.4.1

  • Apple iOS 13.0 through IOS 13.4.1

  • iPadOS 13.1.0 through iPadOS 13.4.0

  • watchOS prior to 5.3.7

  • watchOS 6.0 through 6.2.0

RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
Low
Description: 

Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution. Details of the vulnerabilities are as follows: 

  • Out-of-bounds write error that could cause arbitrary code execution. (CVE-2020-9818)

  • Heap-based buffer-overflow vulnerability that could cause arbitrary code execution. (CVE-2020-9819) 

Successful exploitation of these vulnerabilities could result in arbitrary code execution. An attacker could then execute code with privileges given to the mail application, delete emails, crash the mail application, and cause device slowdowns.

Actions: 
  • After appropriate testing, immediately apply the patches provided by Apple to vulnerable systems.

  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

  • Remind users not to download, accept, or execute files from un-trusted or unknown sources.

  • Remind users not to visit untrusted websites or follow links provided by unknown or un-trusted sources.

  • Apply the Principle of Least Privilege to all systems and services.