Vulnerability Name: | CVE-2020-9950 (CCN-192623) | ||||||||||||
Assigned: | 2020-11-12 | ||||||||||||
Published: | 2020-11-12 | ||||||||||||
Updated: | 2020-12-09 | ||||||||||||
Summary: | A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, tvOS 14.0, Safari 14.0, iOS 14.0 and iPadOS 14.0. Processing maliciously crafted web content may lead to arbitrary code execution. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9950 Source: XF Type: UNKNOWN apple-safari-cve20209950-code-exec(192623) Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT211843 Source: CCN Type: Apple security document HT211844 About the security content of watchOS 7.0 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT211844 Source: CCN Type: Apple security document HT211845 About the security content of Safari 14.0 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT211845 Source: CCN Type: Apple security document HT211850 About the security content of iOS 14.0 and iPadOS 14.0 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT211850 Source: CCN Type: ZDI-20-1394 Apple Safari TextNode Use-After-Free Information Disclosure Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |