{"containers":{"cna":{"affected":[{"product":"tvOS","vendor":"Apple","versions":[{"lessThan":"14.0","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"7.0","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"iOS and iPadOS","vendor":"Apple","versions":[{"lessThan":"14.0","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"11.0","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges."}],"problemTypes":[{"descriptions":[{"description":"An application may be able to execute arbitrary code with kernel privileges","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-12-15T19:06:28.000Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211843"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211850"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211844"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211931"},{"name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://seclists.org/fulldisclosure/2020/Dec/32"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"product-security@apple.com","ID":"CVE-2020-9966","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"14.0"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"7.0"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_value":"14.0"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"11.0"}]}}]},"vendor_name":"Apple"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An application may be able to execute arbitrary code with kernel privileges"}]}]},"references":{"reference_data":[{"name":"https://support.apple.com/en-us/HT211843","refsource":"MISC","url":"https://support.apple.com/en-us/HT211843"},{"name":"https://support.apple.com/en-us/HT211850","refsource":"MISC","url":"https://support.apple.com/en-us/HT211850"},{"name":"https://support.apple.com/en-us/HT211844","refsource":"MISC","url":"https://support.apple.com/en-us/HT211844"},{"name":"https://support.apple.com/en-us/HT211931","refsource":"MISC","url":"https://support.apple.com/en-us/HT211931"},{"name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2020/Dec/32"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:50:57.289Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211843"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211850"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211844"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211931"},{"name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2020/Dec/32"}]}]},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2020-9966","datePublished":"2020-12-08T19:21:13.000Z","dateReserved":"2020-03-02T00:00:00.000Z","dateUpdated":"2024-08-04T10:50:57.289Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}