CVE-2020-9967
moderate-risk
Published 2021-04-02
Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (19)
Affected Vendors
References (12)
Third Party Advisory
http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overfl...
Vendor Advisory
https://support.apple.com/en-us/HT211843
Vendor Advisory
https://support.apple.com/en-us/HT211844
Vendor Advisory
https://support.apple.com/en-us/HT211850
Vendor Advisory
https://support.apple.com/en-us/HT211931
Vendor Advisory
https://support.apple.com/en-us/HT212011
Third Party Advisory
http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overfl...
Vendor Advisory
https://support.apple.com/en-us/HT211843
Vendor Advisory
https://support.apple.com/en-us/HT211844
Vendor Advisory
https://support.apple.com/en-us/HT211850
Vendor Advisory
https://support.apple.com/en-us/HT211931
Vendor Advisory
https://support.apple.com/en-us/HT212011
47
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
4/34 · Minimal
Exposure
19/34 · Moderate