CVE-2020-9910
moderate-risk
Published 2020-10-16
Multiple issues were addressed with improved logic. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
Do I need to act?
-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (14)
Vendor Advisory
https://support.apple.com/HT211288
Vendor Advisory
https://support.apple.com/HT211290
Vendor Advisory
https://support.apple.com/HT211291
Vendor Advisory
https://support.apple.com/HT211292
Vendor Advisory
https://support.apple.com/HT211293
Vendor Advisory
https://support.apple.com/HT211294
Vendor Advisory
https://support.apple.com/HT211295
Vendor Advisory
https://support.apple.com/HT211288
Vendor Advisory
https://support.apple.com/HT211290
Vendor Advisory
https://support.apple.com/HT211291
Vendor Advisory
https://support.apple.com/HT211292
Vendor Advisory
https://support.apple.com/HT211293
Vendor Advisory
https://support.apple.com/HT211294
Vendor Advisory
https://support.apple.com/HT211295
45
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate