Vulnerability Name: | CVE-2020-9939 (CCN-186449) | ||||||||||||
Assigned: | 2020-08-10 | ||||||||||||
Published: | 2020-08-10 | ||||||||||||
Updated: | 2020-10-29 | ||||||||||||
Summary: | This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to load unsigned kernel extensions. | ||||||||||||
CVSS v3 Severity: | 6.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) 5.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-367 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9939 Source: XF Type: UNKNOWN apple-macos-cve20209939-priv-esc(186449) Source: CCN Type: Apple security document HT211289 About the security content of macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra Source: MISC Type: Vendor Advisory https://support.apple.com/kb/HT211289 Source: CCN Type: ZDI-20-960 (Pwn2Own) Apple macOS kextload Time-Of-Check Time-Of-Use Memory Corruption Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
Vulnerability Name: | CVE-2020-9939 (CCN-186645) | ||||||||||||
Assigned: | 2020-08-05 | ||||||||||||
Published: | 2020-08-05 | ||||||||||||
Updated: | 2020-08-05 | ||||||||||||
Summary: | Apple macOS could allow a local authenticated attacker to bypass security restrictions, caused by improper input validation by the Sandbox component. By sending a specially-crafted request, an attacker could exploit this vulnerability to load unsigned kernel extensions. | ||||||||||||
CVSS v3 Severity: | 6.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) 5.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9939 Source: XF Type: UNKNOWN apple-macos-cve20209939-sec-bypass(186645) Source: CCN Type: Apple security document HT211289 About the security content of macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
BACK |