TROYANOSYVIRUS
Volver a CVEs

CVE-2021-30883

HIGHCISA KEV
7.8

Descripcion

A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..

Detalles CVE

Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado8/24/2021
Ultima modificacion10/23/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorApple
ProductoMultiple Products
Nombre vulnerabilidadApple Multiple Products Memory Corruption Vulnerability
Fecha inclusion KEV2022-05-23
Fecha limite remediacion2022-06-13
Uso en ransomwareUnknown

Productos afectados

apple:ipadosapple:iphone_osapple:macosapple:tvosapple:watchos

Debilidades (CWE)

CWE-787CWE-787

Referencias

https://support.apple.com/en-us/HT212846(product-security@apple.com)
https://support.apple.com/en-us/HT212868(product-security@apple.com)
https://support.apple.com/en-us/HT212869(product-security@apple.com)
https://support.apple.com/en-us/HT212872(product-security@apple.com)
https://support.apple.com/en-us/HT212874(product-security@apple.com)
https://support.apple.com/en-us/HT212876(product-security@apple.com)
https://support.apple.com/en-us/HT212846(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212868(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212869(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212872(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212874(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212876(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.