829
VMScore

CVE-2020-3837

Published: 27/02/2020 Updated: 21/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with kernel privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os

apple ipados

apple tvos

apple watchos

apple mac os x

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-1-28-1 iOS 1331 and iPadOS 1331 iOS 1331 and iPadOS 1331 are now available and address the following: Audio Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation Impact: An application may be able to execute arbitrary co ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-1-28-3 watchOS 612 watchOS 612 is now available and addresses the following: AnnotationKit Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An out-of-bounds read ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-1-28-4 tvOS 1331 tvOS 1331 is now available and addresses the following: Audio Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory h ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-1-28-2 macOS Catalina 10153, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra macOS Catalina 10153, Security Update 2020-001 Mojave, and Security Update 2020-001 High Sierra are now available and address the following: AnnotationKit Available for: macOS Catali ...

Github Repositories

Extreme Vulnerable IOKit driver

ExtremeVulnerableDriver This is a XNU (IOKit) kernel extension inspired by the hacksysteam/HackSysExtremeVulnerableDriver written by me (TrungNguyen1909) ExtremeVulnerableDriver is intentionally vulnerable XNU driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level Types of vulnerabilities Stack buffer overflow (based on matesC

iOS 12.0-13.3 tfp0

time_waste iOS 120-133 tfp0 for all devices (in theory) using heap overflow bug by Brandon Azad (CVE-2020-3837) and cuck00 info leak by Siguza (will probably remove in the future) Exploitation is mostly the same as oob_timestamp with a few differences The main difference is that this one does not rely on hardcoded addresses and thus should be more reliable The rest of the