CVE-2020-27911
moderate-risk
Published 2020-12-08
An integer overflow was addressed through improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
Do I need to act?
~
2.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Vendors
References (18)
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/26
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/32
Vendor Advisory
https://support.apple.com/en-us/HT211928
Vendor Advisory
https://support.apple.com/en-us/HT211929
Vendor Advisory
https://support.apple.com/en-us/HT211930
Vendor Advisory
https://support.apple.com/en-us/HT211931
Vendor Advisory
https://support.apple.com/en-us/HT211933
Vendor Advisory
https://support.apple.com/en-us/HT211935
Vendor Advisory
https://support.apple.com/kb/HT212011
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/26
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/32
Vendor Advisory
https://support.apple.com/en-us/HT211928
Vendor Advisory
https://support.apple.com/en-us/HT211929
Vendor Advisory
https://support.apple.com/en-us/HT211930
Vendor Advisory
https://support.apple.com/en-us/HT211931
Vendor Advisory
https://support.apple.com/en-us/HT211933
Vendor Advisory
https://support.apple.com/en-us/HT211935
Vendor Advisory
https://support.apple.com/kb/HT212011
44
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
6/34 · Minimal
Exposure
14/34 · Moderate