About the security content of tvOS 12.3

This document describes the security content of tvOS 12.3.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss or confirm security issues until an investigation has taken place and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

tvOS 12.3

Released 13 May 2019

AppleFileConduit

Available for: Apple TV 4K and Apple TV HD

Impact: An application may be able to execute arbitrary code with system privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8593: Dany Lisiansky (@DanyL931)

Bluetooth

Available for: Apple TV 4K and Apple TV HD

Impact: Due to a misconfiguration in the Bluetooth pairing protocols of a Bluetooth Low Energy (BLE) version of FIDO Security Keys, it may be possible for an attacker with physical proximity to be able to intercept Bluetooth traffic during pairing

Description: This issue was addressed by disabling accessories with insecure Bluetooth connections. Customers using the Bluetooth Low Energy (BLE) version of the Titan Security Key by Google should review Android’s June Bulletins and Google’s advisory and take appropriate action.

CVE-2019-2102: Matt Beaver and Erik Peterson of Microsoft Corp.

Entry added 17 September 2019

CoreAudio

Available for: Apple TV 4K and Apple TV HD

Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved error handling.

CVE-2019-8592: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Entry added 1 August 2019

CoreAudio

Available for: Apple TV 4K and Apple TV HD

Impact: Processing a maliciously crafted film file may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2019-8585: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

CoreText

Available for: Apple TV 4K and Apple TV HD

Impact: Processing a maliciously crafted font may result in the disclosure of process memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2019-8582: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Entry added 25 July 2019

Disk Images

Available for: Apple TV 4K and Apple TV HD

Impact: An application may be able to read restricted memory

Description: A validation issue was addressed with improved input sanitisation.

CVE-2019-8560: Nikita Pupyshev of Bauman Moscow State Technological University

Entry updated 30 May 2019

Kernel

Available for: Apple TV 4K and Apple TV HD

Impact: An application may be able to read restricted memory

Description: A validation issue was addressed with improved input sanitisation.

CVE-2019-8633: Zhuo Liang of Qihoo 360 Vulcan Team

Entry added 17 September 2019

Kernel

Available for: Apple TV 4K and Apple TV HD

Impact: A local user may be able to cause unexpected system termination or read kernel memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2019-8576: Brandon Azad of Google Project Zero, Junho Jang and Hanul Choi of LINE Security Team

Entry updated 30 May 2019

Kernel

Available for: Apple TV 4K and Apple TV HD

Impact: An application may be able to cause unexpected system termination or write kernel memory

Description: A type confusion issue was addressed with improved memory handling.

CVE-2019-8591: Ned Williamson working with Google Project Zero

Messages

Available for: Apple TV 4K and Apple TV HD

Impact: Users removed from an iMessage conversation may still be able to alter state

Description: A logic issue was addressed with improved state management.

CVE-2019-8631: Jamie Bishop of Dynastic

Entry added 1 August 2019

MobileInstallation

Available for: Apple TV 4K and Apple TV HD

Impact: A local user may be able to modify protected parts of the file system

Description: A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks.

CVE-2019-8568: Dany Lisiansky (@DanyL931)

MobileLockdown

Available for: Apple TV 4K and Apple TV HD

Impact: A malicious application may be able to gain root privileges

Description: An input validation issue was addressed with improved input validation.

CVE-2019-8637: Dany Lisiansky (@DanyL931)

SQLite

Available for: Apple TV 4K and Apple TV HD

Impact: An application may be able to gain elevated privileges

Description: An input validation issue was addressed with improved memory handling.

CVE-2019-8577: Omer Gull of Checkpoint Research

SQLite

Available for: Apple TV 4K and Apple TV HD

Impact: A maliciously crafted SQL query may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved input validation.

CVE-2019-8600: Omer Gull of Checkpoint Research

SQLite

Available for: Apple TV 4K and Apple TV HD

Impact: A malicious application may be able to read restricted memory

Description: An input validation issue was addressed with improved input validation.

CVE-2019-8598: Omer Gull of Checkpoint Research

SQLite

Available for: Apple TV 4K and Apple TV HD

Impact: A malicious application may be able to elevate privileges

Description: A memory corruption issue was addressed by removing the vulnerable code.

CVE-2019-8602: Omer Gull of Checkpoint Research

sysdiagnose

Available for: Apple TV 4K and Apple TV HD

Impact: An application may be able to execute arbitrary code with system privileges

Description: The issue was addressed with improved permissions logic.

CVE-2019-8574: Dayton Pidhirney (@_watbulb) of Seekintoo (@seekintoo)

Entry updated 3 February 2020

WebKit

Available for: Apple TV 4K and Apple TV HD

Impact: Processing maliciously crafted web content may result in the disclosure of process memory

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2019-8607: Junho Jang and Hanul Choi of LINE Security Team

WebKit

Available for: Apple TV 4K and Apple TV HD

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: Multiple memory corruption issues were addressed with improved memory handling.

CVE-2019-6237: G. Geshev working with Trend Micro Zero Day Initiative, Liu Long of Qihoo 360 Vulcan Team

CVE-2019-8571: 01 working with Trend Micro's Zero Day Initiative

CVE-2019-8583: sakura of Tencent Xuanwu Lab, jessica (@babyjess1ca_) of Tencent Keen Lab and dwfault working at ADLab of Venustech

CVE-2019-8584: G. Geshev of MWR Labs working with Trend Micro Zero Day Initiative

CVE-2019-8586: an anonymous researcher

CVE-2019-8587: G. Geshev working with Trend Micro Zero Day Initiative

CVE-2019-8594: Suyoung Lee and Sooel Son of KAIST Web Security & Privacy Lab and HyungSeok Han and Sang Kil Cha of KAIST SoftSec Lab

CVE-2019-8595: G. Geshev from MWR Labs working with Trend Micro Zero Day Initiative

CVE-2019-8596: Wen Xu of SSLab at Georgia Tech

CVE-2019-8597: 01 working with Trend Micro Zero Day Initiative

CVE-2019-8601: Fluoroacetate working with Trend Micro's Zero Day Initiative

CVE-2019-8608: G. Geshev working with Trend Micro Zero Day Initiative

CVE-2019-8609: Wen Xu of SSLab, Georgia Tech

CVE-2019-8610: Anonymous working with Trend Micro Zero Day Initiative

CVE-2019-8611: Samuel Groß of Google Project Zero

CVE-2019-8615: G. Geshev from MWR Labs working with Trend Micro's Zero Day Initiative

CVE-2019-8619: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab

CVE-2019-8622: Samuel Groß of Google Project Zero

CVE-2019-8623: Samuel Groß of Google Project Zero

CVE-2019-8628: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab

Wi-Fi

Available for: Apple TV 4K and Apple TV HD

Impact: An attacker in a privileged network position can modify driver state

Description: A logic issue was addressed with improved state management.

CVE-2019-8612: Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt

Entry added 30 May 2019

Wi-Fi

Available for: Apple TV 4K and Apple TV HD

Impact: A device may be passively tracked by its Wi-Fi MAC address

Description: A user privacy issue was addressed by removing the broadcast MAC address.

CVE-2019-8620: David Kreitschmann and Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt

Additional recognition

CoreAudio

We would like to acknowledge riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative for their assistance.

Entry added 25 July 2019

CoreFoundation

We would like to acknowledge Vozzie and Rami and m4bln, Xiangqian Zhang, Huiming Liu of Tencent's Xuanwu Lab for their assistance.

Kernel

We would like to acknowledge Brandon Azad of Google Project Zero and an anonymous researcher for their assistance.

MediaLibrary

We would like to acknowledge Angel Ramirez and Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. for their assistance.

MobileInstallation

We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: