First published: Thu Nov 05 2020(Updated: )
An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. A local attacker may be able to elevate their privileges.
Credit: Tim Michaud @TimGMichaud Leviathan product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.2 | 14.2 |
Apple iOS, iPadOS, and watchOS | <14.2 | 14.2 |
Apple iOS, iPadOS, and watchOS | <14.2 | 14.2 |
Apple iOS, iPadOS, and watchOS | <7.1 | 7.1 |
Apple iOS, iPadOS, and watchOS | <14.2 | |
iOS | <14.2 | |
Apple iOS and macOS | <11.0.1 | |
tvOS | <14.2 | |
Apple iOS, iPadOS, and watchOS | <7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-10003 is a vulnerability that existed within the path validation logic for symlinks in Apple iOS, iPadOS, tvOS, macOS Big Sur, and watchOS.
CVE-2020-10003 affects Apple devices running iOS 14.2, iPadOS 14.2, tvOS 14.2, macOS Big Sur 11.0.1, and watchOS 7.1.
The impact of CVE-2020-10003 was an issue with the path validation logic for symlinks, which could potentially lead to security vulnerabilities.
CVE-2020-10003 was addressed by Apple with improved path sanitization.
More information about CVE-2020-10003 can be found on the Apple support website: [link](https://support.apple.com/en-us/HT211929), [link](https://support.apple.com/en-us/HT211930), [link](https://support.apple.com/en-us/HT211928).