7.8
CVSSv3

CVE-2019-8781

Published: 18/12/2019 Updated: 21/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with kernel privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2019-10-07-1 macOS Catalina 1015 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Apple Product ...

Github Repositories

Exploit POC for the bug CVE-2019-8781, found by @LinusHenze

CVE-2019-8781 Security Advisory CVE-2019-8781 POC Details The POC elevate the process to root and execute a shell Exploit environment - macOS 10146 (18G95) (Should works on all macOS version that's released before 10150) - SMEP: On - SMAP: Off - Kernel ASLR slide passed to the argv[1] Building You will need Xcode 941 Co

macOS Kernel Exploit for CVE-2019-8781.

macOS-Kernel-Exploit DISCLAIMER You need to know the KASLR slide to use the exploit Also SMAP needs to be disabled which means that it's not exploitable on Macs after 2015 These limitations make the exploit pretty much unusable for in-the-wild exploitation but still helpful for security researchers in a controlled lab environment This exploit is intended for security re