First published: Wed Jul 15 2020(Updated: )
A certificate validation issue existed when processing administrator added certificates. This issue was addressed with improved certificate validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. An attacker may have been able to impersonate a trusted website using shared key material for an administrator added certificate.
Credit: Brian Wolff Asana product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9868 is a certificate validation issue that existed when processing administrator added certificates.
CVE-2020-9868 affects macOS Catalina up to version 10.15.6, Mojave, High Sierra, iOS up to version 13.6, iPadOS up to version 13.6, watchOS up to version 6.2.8, and tvOS up to version 13.4.8.
To fix the certificate validation issue in macOS Catalina, you should update to version 10.15.6 or later.
To fix the certificate validation issue in iOS, you should update to version 13.6 or later.
You can find more information about CVE-2020-9868 on the Apple website: [https://support.apple.com/en-us/HT211289](https://support.apple.com/en-us/HT211289), [https://support.apple.com/en-us/HT211288](https://support.apple.com/en-us/HT211288), [https://support.apple.com/en-us/HT211291](https://support.apple.com/en-us/HT211291).