About the security content of watchOS 7.2
This document describes the security content of watchOS 7.2.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
Apple security documents reference vulnerabilities by CVE-ID when possible.
For more information about security, see the Apple Product Security page.
watchOS 7.2
Audio
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted audio file may disclose restricted memory
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2020-29610: Anonymous working with Trend Micro Zero Day Initiative
CoreAudio
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution
Description: An out-of-bounds write issue was addressed with improved bounds checking.
CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab
FontParser
Available for: Apple Watch Series 3 and later
Impact: A remote attacker may be able to leak memory
Description: An out-of-bounds read was addressed with improved bounds checking.
CVE-2020-29608: Xingwei Lin of Ant Security Light-Year Lab
FontParser
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted font may result in the disclosure of process memory
Description: An information disclosure issue was addressed with improved state management.
CVE-2020-27946: Mateusz Jurczyk of Google Project Zero
FontParser
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted font file may lead to arbitrary code execution
Description: A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation.
CVE-2020-27943: Mateusz Jurczyk of Google Project Zero
CVE-2020-27944: Mateusz Jurczyk of Google Project Zero
CVE-2020-29624: Mateusz Jurczyk of Google Project Zero
ImageIO
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted image may lead to a denial of service
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2020-29615: Xingwei Lin of Ant Security Light-Year Lab
ImageIO
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted image may lead to heap corruption
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2020-29617: Xingwei Lin of Ant Security Light-Year Lab
CVE-2020-29619: Xingwei Lin of Ant Security Light-Year Lab
ImageIO
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted image may lead to arbitrary code execution
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2020-29618: Xingwei Lin of Ant Security Light-Year Lab
ImageIO
Available for: Apple Watch Series 3 and later
Impact: Processing a maliciously crafted image may lead to arbitrary code execution
Description: An out-of-bounds write issue was addressed with improved bounds checking.
CVE-2020-29611: Alexandru-Vlad Niculae working with Google Project Zero
Security
Available for: Apple Watch Series 3 and later
Impact: Unauthorized code execution may lead to an authentication policy violation
Description: This issue was addressed with improved checks.
CVE-2020-27951: Apple
WebRTC
Available for: Apple Watch Series 3 and later
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: A use after free issue was addressed with improved memory management.
CVE-2020-15969: an anonymous researcher
Wi-Fi
Available for: Apple Watch Series 3 and later
Impact: A malicious application may be able to execute arbitrary code with kernel privileges
Description: A buffer overflow was addressed with improved size validation.
CVE-2021-31077: Lee of CompSec@SNU
Additional recognition
CoreAudio
We would like to acknowledge JunDong Xie and Xingwei Lin of Ant Security Light-Year Lab for their assistance.
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.