About the security content of iOS 14.3 and iPadOS 14.3

This document describes the security content of iOS 14.3 and iPadOS 14.3.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss or confirm security issues until an investigation has taken place and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

iOS 14.3 and iPadOS 14.3

Released 14 December 2020

App Store

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: An enterprise application installation prompt may display the wrong domain

Description: a logic issue was addressed with improved state management.

CVE-2020-29613: Ryan Pickren (ryanpickren.com)

Audio

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted audio file may disclose restricted memory

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2020-29610: Anonymous working with Trend Micro Zero Day Initiative

Entry added 16 March 2021

CoreAudio

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution

Description: an out-of-bounds write issue was addressed with improved bounds checking.

CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab

FontParser

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: a remote attacker may be able to leak memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2020-29608: Xingwei Lin of Ant Security Light-Year Lab

Entry added 16 March 2021

FontParser

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted font may result in the disclosure of process memory

Description: an information disclosure issue was addressed with improved state management.

CVE-2020-27946: Mateusz Jurczyk of Google Project Zero

FontParser

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: processing a maliciously crafted font file may lead to arbitrary code execution

Description: A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation.

CVE-2020-27943: Mateusz Jurczyk of Google Project Zero

CVE-2020-27944: Mateusz Jurczyk of Google Project Zero

CVE-2020-29624: Mateusz Jurczyk of Google Project Zero

Entry updated 22 December 2020

ImageIO

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted image may lead to a denial of service

Description: an out-of-bounds read was addressed with improved input validation.

CVE-2020-29615: Xingwei Lin of Ant Security Light-Year Lab

Entry added 16 March 2021

ImageIO

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted image may lead to heap corruption

Description: an out-of-bounds read was addressed with improved input validation.

CVE-2020-29617: Xingwei Lin of Ant Security Light-Year Lab

CVE-2020-29619: Xingwei Lin of Ant Security Light-Year Lab

Entry updated 16 March 2021

ImageIO

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2020-29618: Xingwei Lin of Ant Security Light-Year Lab

Entry updated 16 March 2021

ImageIO

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2020-29611: Alexandru-Vlad Niculae working with Google Project Zero

Entry updated 17 December 2020

Model I/O

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted file may lead to heap corruption

Description: This issue was addressed with improved checks.

CVE-2020-29614: ZhiWei Sun(@5n1p3r0010) of Topsec Alpha Lab

Entry added 16 March 2021

Model I/O

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution

Description: A buffer overflow issue was addressed with improved memory handling.

CVE-2020-9972: Aleksandar Nikolic of Cisco Talos

Entry added 16 March 2021

Security

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Unauthorised code execution may lead to an authentication policy violation

Description: This issue was addressed with improved checks.

CVE-2020-27951: Apple

WebKit Storage

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: A user may be unable to delete browsing history completely

Description: 'Clear History and Website Data' did not clear the history. The issue was addressed with improved data deletion.

CVE-2020-29623: Simon Hunt of OvalTwo LTD

Entry added 16 March 2021

WebRTC

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: processing maliciously crafted web content may lead to arbitrary code execution

Description: a use after free issue was addressed with improved memory management.

CVE-2020-15969: an anonymous researcher

Additional recognition

CoreAudio

We would like to acknowledge JunDong Xie and Xingwei Lin of Ant Security Light-Year Lab for their assistance.

Entry added 16 March 2021

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: