Description Preview
Overview
CVE-2021-30869 is a critical type confusion vulnerability affecting multiple Apple operating systems including iOS, iPadOS, and macOS. This vulnerability allows malicious applications to potentially execute arbitrary code with kernel privileges, effectively giving attackers complete control over affected devices. The vulnerability is particularly concerning as Apple acknowledged that it was actively exploited in the wild before patches were released. Type confusion vulnerabilities occur when a program accesses a resource using an incompatible type, which can lead to out-of-bounds memory access and code execution.
Remediation
Users should immediately update their devices to the following patched versions:
- iOS: Update to iOS 12.5.5 or iOS 14.4 or later
- iPadOS: Update to iPadOS 14.4 or later
- macOS Big Sur: Update to version 11.2 or later
- macOS Catalina: Install Security Update 2021-001 or Security Update 2021-006
- macOS Mojave: Install Security Update 2021-001
To update:
- For iOS/iPadOS devices: Go to Settings > General > Software Update
- For macOS devices: Go to System Preferences > Software Update
- Install the available updates and restart your device when prompted
References
- Apple Security Advisory for iOS 14.4 and iPadOS 14.4: https://support.apple.com/en-us/HT212146
- Apple Security Advisory for macOS Big Sur 11.2: https://support.apple.com/en-us/HT212147
- Apple Security Advisory for Security Update 2021-006 Catalina: https://support.apple.com/en-us/HT212824
- Apple Security Advisory for iOS 12.5.5: https://support.apple.com/en-us/HT212825
- Common Weakness Enumeration (CWE-843): Type Confusion: https://cwe.mitre.org/data/definitions/843.html
Early Warning
Armis Early Warning customers received an advanced alert on this vulnerability.
- Armis Alert Date
- Sep 24, 2021
- CISA KEV Date
- Nov 3, 2021
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- UtilitiesUtilities
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Accommodation & Food ServicesAccommodation & Food Services
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- MiningMining
- ConstructionConstruction
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Wholesale TradeWholesale Trade