mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-14 11:02:11 +02:00
24 lines
1.5 KiB
Markdown
24 lines
1.5 KiB
Markdown
### [CVE-2021-30869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30869)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/houjingyi233/macOS-iOS-system-security
|
|
|