cve/2020/CVE-2020-27935.md

28 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-27935](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27935)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%207.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions&color=brighgreen)
### Description
Multiple issues were addressed with improved logic. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A sandboxed process may be able to circumvent sandbox restrictions.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/LIJI32/SnatchBox
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/houjingyi233/macOS-iOS-system-security
- https://github.com/nomi-sec/PoC-in-GitHub