### [CVE-2021-30773](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30773) ![](https://img.shields.io/static/v1?label=Product&message=iOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20malicious%20application%20may%20be%20able%20to%20bypass%20code%20signing%20checks&color=brighgreen) ### Description An issue in code signature validation was addressed with improved checks. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. A malicious application may be able to bypass code signing checks. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Abdulhadi21/fugu14 - https://github.com/Abdulhadi21/https-github.com-LinusHenze-Fugu14 - https://github.com/LinusHenze/Fugu14 - https://github.com/epeth0mus/Fugu16 - https://github.com/evilcorp1311/kkkk - https://github.com/gfam2801/fugu14-online - https://github.com/houjingyi233/macOS-iOS-system-security - https://github.com/nanerasingh/fugu14