Vulnerability Name: | CVE-2021-30748 (CCN-206146) |
Assigned: | 2021-07-21 |
Published: | 2021-07-21 |
Updated: | 2022-02-11 |
Summary: | A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. An application may be able to execute arbitrary code with kernel privileges.
|
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-787
|
Vulnerability Consequences: | Gain Privileges |
References: | Source: MITRE Type: CNA CVE-2021-30748
Source: XF Type: UNKNOWN apple-macos-cve202130748-priv-esc(206146)
Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212601
Source: CCN Type: Apple security document HT212602 About the security content of macOS Big Sur 11.5
Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212602
Source: CONFIRM Type: Vendor Advisory https://support.apple.com/kb/HT212604
|
Vulnerable Configuration: | Configuration 1: cpe:/o:apple:ipados:*:*:*:*:*:*:*:* (Version < 14.7)OR cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version < 14.7)OR cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version < 11.5)OR cpe:/o:apple:tvos:*:*:*:*:*:*:*:* (Version < 14.7) Configuration CCN 1: cpe:/o:apple:macos_big_sur:11.4:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |