macOS 10.15.x < 10.15.5 Supplemental Update / 10.13.x < 10.13.6 Security Update 2020-003

high Nessus Plugin ID 137071

Synopsis

The remote host is missing a macOS or Mac OS X security update or supplemental update that fixes a remote code execution vulnerability

Description

The remote host is running a version of macOS / Mac OS X that is 10.15.x prior to 10.15.5 Supplemental Update, 10.13.x prior to 10.13.6 Security Update 2020-003. It is, therefore, affected by a remote code execution vulnerability :

- An application may be able to execute arbitrary code with kernel privileges (CVE-2020-9859)

Note that Nessus has not tested for this issue but has instead relied only on the operating system's self-reported version number.

Solution

Upgrade to macOS 10.15.x < 10.15.5 Supplemental Update / 10.13.x < 10.13.6 Security Update 2020-003 or later

See Also

https://support.apple.com/en-us/HT211215

Plugin Details

Severity: High

ID: 137071

File Name: macos_HT211215.nasl

Version: 1.8

Type: local

Agent: macosx

Published: 6/3/2020

Updated: 4/25/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-9859

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/o:apple:macos

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/30/2020

Vulnerability Publication Date: 5/30/2020

CISA Known Exploited Vulnerability Due Dates: 5/3/2022

Reference Information

CVE: CVE-2020-9859

APPLE-SA: APPLE-SA-2020-05-30, HT211215

IAVA: 2020-A-0227-S