CVE-2021-31010
24.08.2021, 19:15
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..Enginsight
Vendor | Product | Version |
---|---|---|
apple | ipados | 𝑥 < 14.8 |
apple | iphone_os | 12.0 ≤ 𝑥 < 12.5.5 |
apple | iphone_os | 14.0 ≤ 𝑥 < 14.8 |
apple | mac_os_x | 10.15 ≤ 𝑥 < 10.15.7 |
apple | mac_os_x | 10.15.7 |
apple | mac_os_x | 10.15.7:security_update_2020 |
apple | mac_os_x | 10.15.7:security_update_2020-001 |
apple | mac_os_x | 10.15.7:security_update_2020-005 |
apple | mac_os_x | 10.15.7:security_update_2020-007 |
apple | mac_os_x | 10.15.7:security_update_2021-001 |
apple | mac_os_x | 10.15.7:security_update_2021-002 |
apple | mac_os_x | 10.15.7:security_update_2021-003 |
apple | mac_os_x | 10.15.7:security_update_2021-006 |
apple | mac_os_x | 10.15.7:security_update_2021-007 |
apple | mac_os_x | 10.15.7:security_update_2021-008 |
apple | mac_os_x | 10.15.7:security_update_2022-001 |
apple | mac_os_x | 10.15.7:security_update_2022-002 |
apple | mac_os_x | 10.15.7:security_update_2022-003 |
apple | mac_os_x | 10.15.7:security_update_2022-004 |
apple | mac_os_x | 10.15.7:supplemental_update |
apple | macos | 11.0 ≤ 𝑥 < 11.6 |
apple | watchos | 𝑥 < 7.6.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References