CVE-2020-9895
high-risk
Published 2020-10-16
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
Do I need to act?
~
2.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (14)
Vendor Advisory
https://support.apple.com/HT211288
Vendor Advisory
https://support.apple.com/HT211290
Vendor Advisory
https://support.apple.com/HT211291
Vendor Advisory
https://support.apple.com/HT211292
Vendor Advisory
https://support.apple.com/HT211293
Vendor Advisory
https://support.apple.com/HT211294
Vendor Advisory
https://support.apple.com/HT211295
Vendor Advisory
https://support.apple.com/HT211288
Vendor Advisory
https://support.apple.com/HT211290
Vendor Advisory
https://support.apple.com/HT211291
Vendor Advisory
https://support.apple.com/HT211292
Vendor Advisory
https://support.apple.com/HT211293
Vendor Advisory
https://support.apple.com/HT211294
Vendor Advisory
https://support.apple.com/HT211295
52
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
14/34 · Moderate