cve/2021/CVE-2021-31010.md
2025-09-29 21:09:30 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2021-31010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31010)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions.%20Apple%20was%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20at%20the%20time%20of%20release.&color=brightgreen)
### Description
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors