Multiple Flaws Found in Apple’s WebKit Browser Engines

NJCCIC Advisory

Original Release Date: 12/3/2020

Summary

Several vulnerabilities have been discovered in the WebKit browser engine (CVE-2020-13584CVE-2020-9948CVE-2020-9951 CVE-2020-9952CVE-2020-9983, CVE-2020-13543 ). Developed by Apple, WebKit is primarily used in Safari, iOS, BlackBerry, and Amazon Kindle browsers. Malicious web page code may trigger multiple use-after-free errors, which could lead to remote and arbitrary code execution. An attacker can exploit these vulnerabilities by tricking the user into visiting a specially-crafted, malicious web page on a browser utilizing WebKit. Multiple versions of WebKitGTK and WPE WebKit are affected.

Recommendations

The NJCCIC recommends users update to the latest stable versions of WebKitGTK and WPE WebKit immediately. Further details can be found in the Cisco Talos Intelligence blog post, and additional information can be found in the WebKitGTK security advisories, WSA-2020-0008 and WSA-2020-0009.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.