cve/2021/CVE-2021-31010.md

24 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-31010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31010)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2012.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%202021%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%207.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions.%20Apple%20was%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20at%20the%20time%20of%20release.&color=brighgreen)
### Description
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors