ID

VAR-202108-2120


CVE

CVE-2021-30866


TITLE

Vulnerabilities in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2021-021191

DESCRIPTION

A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. A device may be passively tracked by its WiFi MAC address. iPadOS , iOS , macOS Unspecified vulnerabilities exist in multiple Apple products.Information may be obtained. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8 watchOS 8 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212819. Accessory Manager Available for: Apple Watch Series 3 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory consumption issue was addressed with improved memory handling. CVE-2021-30837: an anonymous researcher AppleMobileFileIntegrity Available for: Apple Watch Series 3 and later Impact: A local attacker may be able to read sensitive information Description: This issue was addressed with improved checks. CVE-2021-30866: Fabien Duchêne of UCLouvain (Belgium) Entry added October 25, 2021 CoreAudio Available for: Apple Watch Series 3 and later Impact: Processing a malicious audio file may result in unexpected application termination or arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2021-30834: JunDong Xie of Ant Security Light-Year Lab Entry added October 25, 2021 FaceTime Available for: Apple Watch Series 3 and later Impact: An application with microphone permission may unexpectedly access microphone input during a FaceTime call Description: A logic issue was addressed with improved validation. CVE-2021-30882: Adam Bellard and Spencer Reitman of Airtime Entry added October 25, 2021 FontParser Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-30831: Xingwei Lin of Ant Security Light-Year Lab Entry added October 25, 2021 FontParser Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted dfont file may lead to arbitrary code execution Description: This issue was addressed with improved checks. CVE-2021-30840: Xingwei Lin of Ant Security Light-Year Lab Entry added October 25, 2021 FontParser Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted dfont file may lead to arbitrary code execution Description: This issue was addressed with improved checks. CVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab Foundation Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. CVE-2021-30852: Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab Entry added October 25, 2021 ImageIO Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2021-30814: hjy79425575 Entry added October 25, 2021 ImageIO Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: This issue was addressed with improved checks. CVE-2021-30835: Ye Zhang of Baidu Security CVE-2021-30847: Mike Zhang of Pangu Lab Kernel Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2021-30857: Zweig of Kunlun Lab libexpat Available for: Apple Watch Series 3 and later Impact: A remote attacker may be able to cause a denial of service Description: This issue was addressed by updating expat to version 2.4.1. CVE-2013-0340: an anonymous researcher Preferences Available for: Apple Watch Series 3 and later Impact: An application may be able to access restricted files Description: A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. CVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) Preferences Available for: Apple Watch Series 3 and later Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved state management. CVE-2021-30854: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) Sandbox Available for: Apple Watch Series 3 and later Impact: A malicious application may be able to modify protected parts of the file system Description: This issue was addressed with improved checks. CVE-2021-30808: Csaba Fitzl (@theevilbit) of Offensive Security Entry added October 25, 2021 WebKit Available for: Apple Watch Series 3 and later Impact: Visiting a maliciously crafted website may reveal a user's browsing history Description: The issue was resolved with additional restrictions on CSS compositing. CVE-2021-30884: an anonymous researcher Entry added October 25, 2021 WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved state handling. CVE-2021-30818: Amar Menezes (@amarekano) of Zon8Research Entry added October 25, 2021 WebKit Available for: Apple Watch Series 3 and later Impact: An attacker in a privileged network position may be able to bypass HSTS Description: A logic issue was addressed with improved restrictions. CVE-2021-30823: David Gullasch of Recurity Labs Entry added October 25, 2021 WebKit Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted audio file may disclose restricted memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-30836: Peter Nguyen Vu Hoang of STAR Labs Entry added October 25, 2021 WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2021-30809: an anonymous researcher Entry added October 25, 2021 WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2021-30846: Sergei Glazunov of Google Project Zero WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2021-30849: Sergei Glazunov of Google Project Zero WebKit Available for: Apple Watch Series 3 and later Impact: Processing maliciously crafted web content may lead to code execution Description: A memory corruption vulnerability was addressed with improved locking. CVE-2021-30851: Samuel Groß of Google Project Zero Wi-Fi Available for: Apple Watch Series 3 and later Impact: An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup Description: An authorization issue was addressed with improved state management. CVE-2021-30810: an anonymous researcher Additional recognition Sandbox We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance. UIKit We would like to acknowledge an anonymous researcher for their assistance. Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmF4h0EACgkQeC9qKD1p rhjcPxAA0x7qg2GycQ0GJb8VqWSNGGbhKVkwocTvEtOKZmebfdCXWnJ6vycp731f Zz5AtfK1S/SIaQbLLTsZUwuVN9AweRvymsuK3EYCPBupi0hA7G0CQudQ9jFfa70+ cfqW2CLrkZB9FiD0Y6hLRaUR/WczdCeFnD87I4XziqM8JVfPi1YMZ3QndLFR+qoR DOH5cVZQg/EYNuynyIUtLpsbtLCzGiYdkuDb1xozgklY8SYLhOsGP4tbU7ACpbRs 7DEU1laGGByyGz8T3/Z9n7x1589lxDk7VSUPflnv0Fq6FYiahAvKOZQDsAjhs1sI YA4QvtjsEjRq/p/rnElrMYd91e/QuOtixFcYY360YP/FPhHGfBHS7dEko5q/6JwG mGrjm/rHMVfsqSzoLZShdDQrRKz76mW0F2bWWggQqka4GxHtDNGPpYYQJLndQqvu W0RxoYFNBFex39na/nqkVjJNAO1GRFoZy1B0PpjgKbwV3Wn4pGgHcj5ToC15oGUJ 078BFgQW4ucEj59d9hWg0di4JEgFFgph5KwO66BY0LUrHdHVpC5GGccxt1aDXC0j i2uJIlofj/mU1PUBZ0vZ1JP2tDGgEmcKzgStCtYS4ZqK01wA6kKWfF0jpsbFGnXe 57sksI5rtKpbiIiZ4/GRhIQTUNRgIOPoy9rUZnbAtWuUKXWZIrw= =mdve -----END PGP SIGNATURE-----

Trust: 1.98

sources: NVD: CVE-2021-30866 // JVNDB: JVNDB-2021-021191 // VULHUB: VHN-390599 // VULMON: CVE-2021-30866 // PACKETSTORM: 164693 // PACKETSTORM: 164692

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:15.0

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.0

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:15.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:8.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.0.1

Trust: 1.0

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:アップルmodel:watchosscope:eqversion:8.0

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:アップルmodel:tvosscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-021191 // NVD: CVE-2021-30866

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30866
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-30866
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202108-2130
value: MEDIUM

Trust: 0.6

VULHUB: VHN-390599
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-30866
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-390599
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30866
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-30866
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-390599 // JVNDB: JVNDB-2021-021191 // CNNVD: CNNVD-202108-2130 // NVD: CVE-2021-30866

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-021191 // NVD: CVE-2021-30866

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202108-2130

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202108-2130

PATCH

title:HT212815 Apple  Security updateurl:https://support.apple.com/en-us/HT212814

Trust: 0.8

title:Apple tvOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171078

Trust: 0.6

sources: JVNDB: JVNDB-2021-021191 // CNNVD: CNNVD-202108-2130

EXTERNAL IDS

db:NVDid:CVE-2021-30866

Trust: 3.6

db:PACKETSTORMid:164692

Trust: 0.8

db:JVNDBid:JVNDB-2021-021191

Trust: 0.8

db:AUSCERTid:ESB-2021.3578

Trust: 0.6

db:CNNVDid:CNNVD-202108-2130

Trust: 0.6

db:PACKETSTORMid:164693

Trust: 0.2

db:VULHUBid:VHN-390599

Trust: 0.1

db:VULMONid:CVE-2021-30866

Trust: 0.1

sources: VULHUB: VHN-390599 // VULMON: CVE-2021-30866 // JVNDB: JVNDB-2021-021191 // PACKETSTORM: 164693 // PACKETSTORM: 164692 // CNNVD: CNNVD-202108-2130 // NVD: CVE-2021-30866

REFERENCES

url:https://support.apple.com/kb/ht212869

Trust: 2.5

url:https://support.apple.com/en-us/ht212815

Trust: 2.3

url:https://support.apple.com/en-us/ht212814

Trust: 1.7

url:https://support.apple.com/en-us/ht212819

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-30866

Trust: 1.0

url:https://www.auscert.org.au/bulletins/esb-2021.3578

Trust: 0.6

url:https://packetstormsecurity.com/files/164692/apple-security-advisory-2021-10-26-10.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-30852

Trust: 0.2

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30849

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30854

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30851

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30846

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0340

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30808

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30841

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30834

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30843

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30818

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30809

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30831

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30837

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30810

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30857

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30847

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30823

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30814

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30840

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30836

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30842

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-30835

Trust: 0.2

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30884

Trust: 0.1

url:https://support.apple.com/ht212815.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30850

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://support.apple.com/ht212819.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30855

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30811

Trust: 0.1

sources: VULHUB: VHN-390599 // VULMON: CVE-2021-30866 // JVNDB: JVNDB-2021-021191 // PACKETSTORM: 164693 // PACKETSTORM: 164692 // CNNVD: CNNVD-202108-2130 // NVD: CVE-2021-30866

CREDITS

Apple

Trust: 0.2

sources: PACKETSTORM: 164693 // PACKETSTORM: 164692

SOURCES

db:VULHUBid:VHN-390599
db:VULMONid:CVE-2021-30866
db:JVNDBid:JVNDB-2021-021191
db:PACKETSTORMid:164693
db:PACKETSTORMid:164692
db:CNNVDid:CNNVD-202108-2130
db:NVDid:CVE-2021-30866

LAST UPDATE DATE

2024-08-14T13:06:41.478000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-390599date:2023-01-09T00:00:00
db:VULMONid:CVE-2021-30866date:2021-08-24T00:00:00
db:JVNDBid:JVNDB-2021-021191date:2024-07-18T06:00:00
db:CNNVDid:CNNVD-202108-2130date:2021-11-24T00:00:00
db:NVDid:CVE-2021-30866date:2023-11-07T03:33:35.980

SOURCES RELEASE DATE

db:VULHUBid:VHN-390599date:2021-08-24T00:00:00
db:VULMONid:CVE-2021-30866date:2021-08-24T00:00:00
db:JVNDBid:JVNDB-2021-021191date:2024-07-18T00:00:00
db:PACKETSTORMid:164693date:2021-10-28T14:58:57
db:PACKETSTORMid:164692date:2021-10-28T14:58:43
db:CNNVDid:CNNVD-202108-2130date:2021-08-24T00:00:00
db:NVDid:CVE-2021-30866date:2021-08-24T19:15:14.897