var-202006-1635
Vulnerability from variot
An entitlement parsing issue was addressed with improved parsing. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A malicious application could interact with system processes to access private information and perform privileged actions. plural Apple The product contains unspecified vulnerabilities due to imperfect checks.Any entitlement may be used through the application. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple iPadOS is an operating system for iPad tablets. Apple macOS Catalina is a dedicated operating system developed for Mac computers. AppleMobileFileIntegrity is one of the plugins with file integrity checking function. A security vulnerability exists in the AppleMobileFileIntegrity component of several Apple products. The following products and versions are affected: Apple macOS Catalina prior to 10.15.5; iOS prior to 13.5; iPadOS prior to 13.5; tvOS prior to 13.4.5; watchOS prior to 6.2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1635", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "13.4.5" }, { "model": "ipados", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "13.5" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "13.5" }, { "model": "watchos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "6.2.5" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.15.5" }, { "model": "tvos", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "13.4.5 \u672a\u6e80 (apple tv 4k)" }, { "model": "ipados", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "13.5 \u672a\u6e80 (ipad air 2 \u4ee5\u964d)" }, { "model": "watchos", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "6.2.5 \u672a\u6e80 (apple watch series 1 \u4ee5\u964d )" }, { "model": "ipados", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "13.5 \u672a\u6e80 (ipad mini 4 \u4ee5\u964d)" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.13.6" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "13.5 \u672a\u6e80 (ipod touch \u7b2c 7 \u4e16\u4ee3)" }, { "model": "tvos", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "13.4.5 \u672a\u6e80 (apple tv hd)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "13.5 \u672a\u6e80 (iphone 6s \u4ee5\u964d)" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.15.4" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "NVD", "id": "CVE-2020-9842" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:ipados", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:apple_tv", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:watchos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006157" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linus Henze (pinauten.de)", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1317" } ], "trust": 0.6 }, "cve": "CVE-2020-9842", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-9842", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-006157", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-187967", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-9842", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-006157", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-9842", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-006157", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202005-1317", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-187967", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187967" }, { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "CNNVD", "id": "CNNVD-202005-1317" }, { "db": "NVD", "id": "CVE-2020-9842" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An entitlement parsing issue was addressed with improved parsing. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A malicious application could interact with system processes to access private information and perform privileged actions. plural Apple The product contains unspecified vulnerabilities due to imperfect checks.Any entitlement may be used through the application. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple iPadOS is an operating system for iPad tablets. Apple macOS Catalina is a dedicated operating system developed for Mac computers. AppleMobileFileIntegrity is one of the plugins with file integrity checking function. A security vulnerability exists in the AppleMobileFileIntegrity component of several Apple products. The following products and versions are affected: Apple macOS Catalina prior to 10.15.5; iOS prior to 13.5; iPadOS prior to 13.5; tvOS prior to 13.4.5; watchOS prior to 6.2.5", "sources": [ { "db": "NVD", "id": "CVE-2020-9842" }, { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "VULHUB", "id": "VHN-187967" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9842", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU98042162", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-006157", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202005-1317", "trust": 0.7 }, { "db": "NSFOCUS", "id": "48616", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1861", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187967", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187967" }, { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "CNNVD", "id": "CNNVD-202005-1317" }, { "db": "NVD", "id": "CVE-2020-9842" } ] }, "id": "VAR-202006-1635", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187967" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:02:37.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT211168", "trust": 0.8, "url": "https://support.apple.com/en-us/HT211168" }, { "title": "HT211170", "trust": 0.8, "url": "https://support.apple.com/en-us/HT211170" }, { "title": "HT211171", "trust": 0.8, "url": "https://support.apple.com/en-us/HT211171" }, { "title": "HT211175", "trust": 0.8, "url": "https://support.apple.com/en-us/HT211175" }, { "title": "HT211170", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT211170" }, { "title": "HT211171", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT211171" }, { "title": "HT211175", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT211175" }, { "title": "HT211168", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT211168" }, { "title": "Multiple Apple product AppleMobileFileIntegrity Fixes for component security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=121029" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "CNNVD", "id": "CNNVD-202005-1317" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9842" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.apple.com/ht211168" }, { "trust": 1.7, "url": "https://support.apple.com/ht211170" }, { "trust": 1.7, "url": "https://support.apple.com/ht211171" }, { "trust": 1.7, "url": "https://support.apple.com/ht211175" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9842" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9842" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu98042162/index.html" }, { "trust": 0.6, "url": "https://support.apple.com/kb/ht211168" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1861/" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht211170" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48616" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-32343" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht211168" }, { "trust": 0.6, "url": "https://support.apple.com/kb/ht211170" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187967" }, { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "CNNVD", "id": "CNNVD-202005-1317" }, { "db": "NVD", "id": "CVE-2020-9842" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187967" }, { "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "db": "CNNVD", "id": "CNNVD-202005-1317" }, { "db": "NVD", "id": "CVE-2020-9842" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-09T00:00:00", "db": "VULHUB", "id": "VHN-187967" }, { "date": "2020-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "date": "2020-05-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-1317" }, { "date": "2020-06-09T17:15:14.800000", "db": "NVD", "id": "CVE-2020-9842" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-09T00:00:00", "db": "VULHUB", "id": "VHN-187967" }, { "date": "2020-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006157" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-1317" }, { "date": "2024-11-21T05:41:23.137000", "db": "NVD", "id": "CVE-2020-9842" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1317" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Apple Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006157" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1317" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.