Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3. An attacker may be able to trigger a use-after-free in an application deserializing an untrusted NSDictionary.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Iphone Os | < 12.4 |
| Apple | Mac Os X | < 10.14.6 |
| Apple | Tvos | < 12.4 |
| Apple | Watchos | < 5.3 |
Related Weaknesses (CWE)
References
- https://support.apple.com/HT210346Vendor Advisory
- https://support.apple.com/HT210348Vendor Advisory
- https://support.apple.com/HT210351Vendor Advisory
- https://support.apple.com/HT210353Vendor Advisory
- https://support.apple.com/HT210346Vendor Advisory
- https://support.apple.com/HT210348Vendor Advisory
- https://support.apple.com/HT210351Vendor Advisory
- https://support.apple.com/HT210353Vendor Advisory
FAQ
What is CVE-2019-8662?
CVE-2019-8662 is a vulnerability with a CVSS score of 9.8 (CRITICAL). This issue was addressed with improved checks. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3. An attacker may be able to trigger a use-after-free in an application dese...
How severe is CVE-2019-8662?
CVE-2019-8662 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-8662?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Iphone Os, Apple Mac Os X, Apple Tvos, Apple Watchos.