First published: Mon May 18 2020(Updated: )
libxpc. A path handling issue was addressed with improved validation.
Credit: Apple Apple Apple Apple Apple product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.5 | 13.4.5 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.5 | 13.5 |
Apple iOS, iPadOS, and watchOS | <13.5 | 13.5 |
Apple iOS, iPadOS, and watchOS | <6.2.5 | 6.2.5 |
Apple iOS, iPadOS, and watchOS | <13.5 | |
iOS | <13.5 | |
Apple iOS and macOS | <10.15.5 | |
tvOS | <13.4.5 | |
Apple iOS, iPadOS, and watchOS | <6.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-9994.
The affected software includes macOS Catalina, Mojave, High Sierra, iOS, iPadOS, watchOS, and tvOS.
The path handling issue was addressed with improved validation.
The severity of CVE-2020-9994 has not been specified.
You can find more information about this vulnerability at the following references: [https://support.apple.com/en-us/HT211289](https://support.apple.com/en-us/HT211289), [https://support.apple.com/en-us/HT211175](https://support.apple.com/en-us/HT211175), [https://support.apple.com/en-us/HT211170](https://support.apple.com/en-us/HT211170).