{"vulnerability": "cve-2020-2794", "sightings": [{"uuid": "8a8b3be8-1826-47b6-923d-94ddaa31c724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27949", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2348", "content": "#Red_Team_Tactics\n1. Signature bypass in RAUC embedded Linux firmware updater (PoC for CVE-2020-25860)\n2. A post-exploitation technique - Locating the kernel PGD on Android/aarch64\nhttps://duasynt.com/blog/android-pgd-page-tables\n3. Reading/writing memory of other processes using fasttrap (PoC for CVE-2020-27949)\nhttps://github.com/seemoo-lab/dtrace-memaccess_cve-2020-27949", "creation_timestamp": "2020-12-28T23:39:06.000000Z"}, {"uuid": "8224e31b-6820-4001-bf5a-e80ca31045c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27941", "type": "seen", "source": "https://t.me/true_secator/1257", "content": "Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043b\u0438\u043d\u0435\u0439\u043a\u0438 macOS - Big Sur, Catalina \u0438 Mojave. \n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442 58 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0435\u0441\u0442\u044c \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0435 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE), \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 CVE-2020-27914 \u0438\u043b\u0438 CVE-2020-27941. \u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u043e\u0448\u0438\u0431\u043e\u043a \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043d\u043e\u0432\u0435\u0439\u0448\u0435\u0439 Big Sur. \n\n\u0418 \u0432\u0447\u0435\u0440\u0430 \u0436\u0435 \u0432\u044b\u0448\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f 14.3 \u0434\u043b\u044f iOS \u0438 iPadOS, \u0441\u0440\u0435\u0434\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u043c\u0430\u043b\u043e \u0442\u0430\u043a\u0438\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE (\u0434\u0430-\u0434\u0430, iOS \u043d\u0435 \u0436\u0435\u043b\u0435\u0437\u043e\u0431\u0435\u0442\u043e\u043d\u043d\u044b\u0439).\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u044f\u0431\u043b\u043e\u0447\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0441\u0440\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2020-12-15T10:33:31.000000Z"}, {"uuid": "8772278a-615e-4be8-8b9a-ad0469909bd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27943", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2643", "content": "#exploit\nApple CoreText libType1Scaler.dylib:\n\n1. CVE-2020-27943:\nHeap BoF in Counter Control Hints on macOS 10.15.7\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2114\n\n2. CVE-2020-27930:\nApple Safari RCE\nhttps://packetstormsecurity.com/files/161294/GS20210205162808.tgz\n\n3. CVE-2020-27946:\nMemory Disclosure\nhttps://packetstormsecurity.com/files/161297/Apple-CoreText-libType1Scaler.dylib-Memory-Disclosure.html", "creation_timestamp": "2024-10-09T19:19:19.000000Z"}, {"uuid": "1ec45dfc-7964-4ad0-a9cc-e7e75fbd6132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27946", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2643", "content": "#exploit\nApple CoreText libType1Scaler.dylib:\n\n1. CVE-2020-27943:\nHeap BoF in Counter Control Hints on macOS 10.15.7\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2114\n\n2. CVE-2020-27930:\nApple Safari RCE\nhttps://packetstormsecurity.com/files/161294/GS20210205162808.tgz\n\n3. CVE-2020-27946:\nMemory Disclosure\nhttps://packetstormsecurity.com/files/161297/Apple-CoreText-libType1Scaler.dylib-Memory-Disclosure.html", "creation_timestamp": "2024-10-09T19:19:19.000000Z"}]}