CVE-2020-10016
moderate-risk
Published 2020-12-08
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. An application may be able to execute arbitrary code with kernel privileges.
Do I need to act?
-
0.56% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Affected Vendors
References (14)
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/26
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/32
Release Notes
https://support.apple.com/en-us/HT211928
Release Notes
https://support.apple.com/en-us/HT211929
Release Notes
https://support.apple.com/en-us/HT211930
Release Notes
https://support.apple.com/en-us/HT211931
Vendor Advisory
https://support.apple.com/kb/HT212011
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/26
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/32
Release Notes
https://support.apple.com/en-us/HT211928
Release Notes
https://support.apple.com/en-us/HT211929
Release Notes
https://support.apple.com/en-us/HT211930
Release Notes
https://support.apple.com/en-us/HT211931
Vendor Advisory
https://support.apple.com/kb/HT212011
46
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
2/34 · Minimal
Exposure
20/34 · Moderate