Files
CVEs-PoC/2021/CVE-2021-30869.md
T
2024-05-25 21:48:12 +02:00

24 lines
1.5 KiB
Markdown

### [CVE-2021-30869](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30869)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2012.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%202021%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20malicious%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges.%20Apple%20is%20aware%20of%20reports%20that%20an%20exploit%20for%20this%20issue%20exists%20in%20the%20wild.&color=brighgreen)
### Description
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/houjingyi233/macOS-iOS-system-security