Vulnerability Name: | CVE-2021-30682 (CCN-202344) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-05-24 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-05-24 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-09-20 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo CWE-200 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-30682 Source: XF Type: UNKNOWN apple-ios-cve202130682-info-disc(202344) Source: CCN Type: Apple security document HT212528 About the security content of iOS 14.6 and iPadOS 14.6 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212528 Source: CCN Type: Apple security document HT212529 About the security content of macOS Big Sur 11.4 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212529 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212532 Source: CCN Type: Apple security document HT212533 About the security content of watchOS 7.5 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212533 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212534 Source: CCN Type: IBM Security Bulletin 6551876 (Cloud Pak for Security) Cloud Pak for Security uses packages that are vulnerable to multiple CVEs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |