Описание
A logic issue was addressed with improved state management. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 14.5 (исключая)Версия до 14.5 (исключая)Версия от 11.0 (включая) до 11.3 (исключая)Версия до 14.5 (исключая)Версия до 7.4 (исключая)
Одно из
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.4:beta4:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00913
Низкий
8.8 High
CVSS3
9.3 Critical
CVSS2
Дефекты
CWE-269
Связанные уязвимости
github
больше 3 лет назад
A logic issue was addressed with improved state management. This issue is fixed in Security Update 2021-002 Catalina, Security Update 2021-003 Mojave, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges.
EPSS
Процентиль: 75%
0.00913
Низкий
8.8 High
CVSS3
9.3 Critical
CVSS2
Дефекты
CWE-269