First published: Wed Jul 15 2020(Updated: )
Model I/O. A buffer overflow issue was addressed with improved memory handling.
Credit: Aleksandar Nikolic Cisco TalosHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityAleksandar Nikolic Cisco TalosHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom Security product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <13.6 | 13.6 |
Apple iPadOS | <13.6 | 13.6 |
Apple macOS Catalina | <10.15.6 | 10.15.6 |
Apple Mojave | ||
Apple High Sierra | ||
Apple iPadOS | <13.6 | |
Apple iPhone OS | <13.6 | |
Apple Mac OS X | >=10.14.6<10.15.6 | |
Apple watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9882 is a buffer overflow vulnerability in Model I/O that has been fixed with improved memory handling.
Yes, CVE-2020-9882 is a severe vulnerability due to the buffer overflow issue.
macOS Catalina 10.15.6, Apple Mojave, Apple High Sierra, iOS up to version 13.6, iPadOS up to version 13.6, and watchOS up to version 6.2.8 are affected by CVE-2020-9882.
To fix CVE-2020-9882, update your software to the recommended versions mentioned in the Apple support articles.
You can find more information about CVE-2020-9882 in the Apple support articles linked below: [Apple Support Article 1](https://support.apple.com/en-us/HT211289), [Apple Support Article 2](https://support.apple.com/en-us/HT211288), [Apple Support Article 3](https://support.apple.com/en-us/HT211291).