About the security content of watchOS 7.2

This document describes the security content of watchOS 7.2.

About Apple security updates

For our customers’ protection, Apple doesn’t disclose, discuss or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

watchOS 7.2

Released 14 December 2020

Audio

Available for: Apple Watch Series 3 and later

Impact: Processing a maliciously crafted audio file may disclose restricted memory

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2020-29610: Anonymous working with Trend Micro Zero Day Initiative

Entry added 16 March 2021

CoreAudio

Available for: Apple Watch Series 3 and later

Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab

FontParser

Available for: Apple Watch Series 3 and later

Impact: a remote attacker may be able to leak memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2020-29608: Xingwei Lin of Ant Security Light-Year Lab

Entry added 16 March 2021

FontParser

Available for: Apple Watch Series 3 and later

Impact: Processing a maliciously crafted font may result in the disclosure of process memory

Description: An information disclosure issue was addressed with improved state management.

CVE-2020-27946: Mateusz Jurczyk of Google Project Zero

FontParser

Available for: Apple Watch Series 3 and later

Impact: processing a maliciously crafted font file may lead to arbitrary code execution

Description: A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation.

CVE-2020-27943: Mateusz Jurczyk of Google Project Zero

CVE-2020-27944: Mateusz Jurczyk of Google Project Zero

CVE-2020-29624: Mateusz Jurczyk of Google Project Zero

Entry updated 22 December 2020

ImageIO

Available for: Apple Watch Series 3 and later

Impact: Processing a maliciously crafted image may lead to a denial of service

Description: an out-of-bounds read was addressed with improved input validation.

CVE-2020-29615: Xingwei Lin of Ant Security Light-Year Lab

Entry added 16 March 2021

ImageIO

Available for: Apple Watch Series 3 and later

Impact: Processing a maliciously crafted image may lead to heap corruption

Description: an out-of-bounds read was addressed with improved input validation.

CVE-2020-29617: Xingwei Lin of Ant Security Light-Year Lab

CVE-2020-29619: Xingwei Lin of Ant Security Light-Year Lab

Entry updated 16 March 2021

ImageIO

Available for: Apple Watch Series 3 and later

Impact: processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2020-29618: Xingwei Lin of Ant Security Light-Year Lab

Entry updated 16 March 2021

ImageIO

Available for: Apple Watch Series 3 and later

Impact: processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2020-29611: Alexandru-Vlad Niculae working with Google Project Zero

Entry updated 17 December 2020

Security

Available for: Apple Watch Series 3 and later

Impact: Unauthorised code execution may lead to an authentication policy violation

Description: This issue was addressed with improved checks.

CVE-2020-27951: Apple

WebRTC

Available for: Apple Watch Series 3 and later

Impact: processing maliciously crafted web content may lead to arbitrary code execution

Description: a use after free issue was addressed with improved memory management.

CVE-2020-15969: an anonymous researcher

Additional recognition

CoreAudio

We would like to acknowledge JunDong Xie and Xingwei Lin of Ant Security Light-Year Lab for their assistance.

Entry added 16 March 2021

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: