TROYANOSYVIRUS
Retour aux CVEs

CVE-2021-30883

HIGHCISA KEV
7.8

Description

A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..

Details CVE

Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie8/24/2021
Derniere modification10/23/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurApple
ProduitMultiple Products
Nom vulnerabiliteApple Multiple Products Memory Corruption Vulnerability
Date ajout KEV2022-05-23
Date limite remediation2022-06-13
Utilise dans ransomwareUnknown

Produits affectes

apple:ipadosapple:iphone_osapple:macosapple:tvosapple:watchos

Faiblesses (CWE)

CWE-787CWE-787

References

https://support.apple.com/en-us/HT212846(product-security@apple.com)
https://support.apple.com/en-us/HT212868(product-security@apple.com)
https://support.apple.com/en-us/HT212869(product-security@apple.com)
https://support.apple.com/en-us/HT212872(product-security@apple.com)
https://support.apple.com/en-us/HT212874(product-security@apple.com)
https://support.apple.com/en-us/HT212876(product-security@apple.com)
https://support.apple.com/en-us/HT212846(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212868(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212869(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212872(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212874(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT212876(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.