Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-27932


A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to execute arbitrary code with kernel privileges.


Published

2020-12-08T21:15:13.903

Last Modified

2025-04-02T19:09:19.387

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-843
  • Type: Secondary
    CWE-843

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apple icloud < 11.5 Yes
Application apple itunes < 12.11 Yes
Operating System apple ipados < 14.2 Yes
Operating System apple iphone_os < 12.4.9 Yes
Operating System apple iphone_os < 14.2 Yes
Operating System apple mac_os_x < 10.15.7 Yes
Operating System apple macos < 11.0.1 Yes
Operating System apple watchos < 5.3.9 Yes
Operating System apple watchos < 6.2.9 Yes
Operating System apple watchos < 7.1 Yes

References