A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulnerability requires physical access to the device: the device must be plugged in to a computer upon booting, and it must be put into Device Firmware Update (DFU) mode. The exploit is not persistent; rebooting the device overrides any changes to the device's software that were made during an exploited session on the device. Additionally, unless an attacker has access to the device's unlock PIN or fingerprint, an attacker cannot gain access to information protected by Apple's Secure Enclave or Touch ID features.
References
History

Tue, 29 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple a10 Fusion
Apple a10x Fusion
Apple a11 Bionic
Apple a5
Apple a5x
Apple a6
Apple a6x
Apple a7
Apple a8
Apple a8x
Apple a9
Apple a9x
Apple securerom
CPEs cpe:2.3:h:apple:a10_fusion:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a10x_fusion:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a11_bionic:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a5:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a5x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a6:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a6x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a7:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a8:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a8x:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a9:-:*:*:*:*:*:*:*
cpe:2.3:h:apple:a9x:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:securerom:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple a10 Fusion
Apple a10x Fusion
Apple a11 Bionic
Apple a5
Apple a5x
Apple a6
Apple a6x
Apple a7
Apple a8
Apple a8x
Apple a9
Apple a9x
Apple securerom

Sat, 22 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 21 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulnerability requires physical access to the device: the device must be plugged in to a computer upon booting, and it must be put into Device Firmware Update (DFU) mode. The exploit is not persistent; rebooting the device overrides any changes to the device's software that were made during an exploited session on the device. Additionally, unless an attacker has access to the device's unlock PIN or fingerprint, an attacker cannot gain access to information protected by Apple's Secure Enclave or Touch ID features.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published: 2025-02-21T21:17:41.417Z

Updated: 2025-02-22T15:42:26.994Z

Reserved: 2019-02-18T00:00:00.000Z

Link: CVE-2019-8900

cve-icon Vulnrichment

Updated: 2025-02-22T15:42:20.071Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-21T22:15:10.393

Modified: 2025-07-29T18:01:59.703

Link: CVE-2019-8900

cve-icon Redhat

No data.