CVE-2019-8900

A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulnerability requires physical access to the device: the device must be plugged in to a computer upon booting, and it must be put into Device Firmware Update (DFU) mode. The exploit is not persistent; rebooting the device overrides any changes to the device's software that were made during an exploited session on the device. Additionally, unless an attacker has access to the device's unlock PIN or fingerprint, an attacker cannot gain access to information protected by Apple's Secure Enclave or Touch ID features.
References
Link Resource
https://www.kb.cert.org/vuls/id/941987 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:apple:securerom:-:*:*:*:*:*:*:*
OR cpe:2.3:h:apple:a10_fusion:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a10x_fusion:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a11_bionic:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a5:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a5x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a6:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a6x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a7:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a8:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a8x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a9:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a9x:-:*:*:*:*:*:*:*

History

29 Jul 2025, 18:01

Type Values Removed Values Added
First Time Apple a6x
Apple a5
Apple a9
Apple a9x
Apple a10 Fusion
Apple a6
Apple a8
Apple a8x
Apple a7
Apple a11 Bionic
Apple a10x Fusion
Apple a5x
Apple
Apple securerom
CPE cpe:2.3:h:apple:a10_fusion:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a10x_fusion:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a9x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a5:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a7:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a6x:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:securerom:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a11_bionic:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a5x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a6:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a8x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a9:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a8:-:*:*:*:*:*:*:*
Summary
  • (es) Un atacante local no autenticado puede aprovechar una vulnerabilidad en la SecureROM de algunos dispositivos Apple para ejecutar código arbitrario al iniciar dichos dispositivos. Esta vulnerabilidad permite ejecutar código arbitrario en el dispositivo. Para explotar la vulnerabilidad se requiere acceso físico al dispositivo: el dispositivo debe estar conectado a un ordenador al iniciarse y debe estar en modo de actualización de firmware del dispositivo (DFU). El exploit no es persistente; reiniciar el dispositivo anula cualquier cambio en el software del dispositivo que se haya realizado durante una sesión explotada en el dispositivo. Además, a menos que un atacante tenga acceso al PIN de desbloqueo o la huella digital del dispositivo, no puede obtener acceso a la información protegida por las funciones Secure Enclave o Touch ID de Apple.
References () https://www.kb.cert.org/vuls/id/941987 - () https://www.kb.cert.org/vuls/id/941987 - Third Party Advisory

22 Feb 2025, 16:15

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

21 Feb 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-21 22:15

Updated : 2025-07-29 18:01


NVD link : CVE-2019-8900

Mitre link : CVE-2019-8900

CVE.ORG link : CVE-2019-8900


JSON object : View

Products Affected

apple

  • a5x
  • a6x
  • a10x_fusion
  • a11_bionic
  • a5
  • securerom
  • a8x
  • a9x
  • a6
  • a7
  • a8
  • a9
  • a10_fusion
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')