Files
CVEs-PoC/2021/CVE-2021-30657.md
2025-09-29 21:09:30 +02:00

28 lines
1.3 KiB
Markdown

### [CVE-2021-30657](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30657)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20malicious%20application%20may%20bypass%20Gatekeeper%20checks.%C2%A0Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.&color=brightgreen)
### Description
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application may bypass Gatekeeper checks. Apple is aware of a report that this issue may have been actively exploited..
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/cedowens/Swift-Attack
- https://github.com/houjingyi233/macOS-iOS-system-security
- https://github.com/joydo/CVE-Writeups
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/shubham0d/CVE-2021-30657
- https://github.com/shubham0d/CVE-2021-30853
- https://github.com/soosmile/POC