First published: Tue Jan 28 2020(Updated: )
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.4.7, watchOS 5.3.7. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
Credit: Ian Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <5.3.7 | 5.3.7 |
Apple iOS | <12.4.7 | 12.4.7 |
Apple iPhone OS | <12.4.7 | |
Apple watchOS | <5.3.7 | |
Apple iOS | <13.3.1 | 13.3.1 |
Apple iPadOS | <13.3.1 | 13.3.1 |
Apple macOS Catalina | <10.15.3 | 10.15.3 |
Apple Mojave | ||
Apple High Sierra |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-3843 is a memory corruption issue in Wi-Fi that has been addressed with improved input validation.
Apple iOS versions up to and excluding 12.4.7, Apple watchOS versions up to and excluding 5.3.7, Apple iOS versions up to and excluding 13.3.1, Apple iPadOS versions up to and excluding 13.3.1, Apple macOS Catalina versions up to and excluding 10.15.3, Apple Mojave, and Apple High Sierra.
Update your Apple devices to the recommended software versions: iOS 12.4.7, watchOS 5.3.7, iOS 13.3.1, iPadOS 13.3.1, or macOS Catalina 10.15.3.
The severity of CVE-2020-3843 is not specified.
You can find more information about CVE-2020-3843 on the Apple support page. [^1^] [^2^] [^3^]