René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

150 lines
4.5 KiB
JSON

{
"id": "CVE-2021-30966",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-24T19:15:22.527",
"lastModified": "2021-12-29T16:25:46.233",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. User traffic might unexpectedly be leaked to a proxy server despite PAC configurations."
},
{
"lang": "es",
"value": "Se abord\u00f3 un problema l\u00f3gico con una administraci\u00f3n de estado mejorada. Este problema es corregido en macOS Monterey versi\u00f3n 12.1, watchOS versi\u00f3n 8.3, iOS versi\u00f3n 15.2 e iPadOS versi\u00f3n 15.2, tvOS versi\u00f3n 15.2. El tr\u00e1fico de usuarios puede filtrarse no esperadamente a un servidor proxy a pesar de las configuraciones de PAC"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "CCE4E546-A0DD-4E9E-A6B9-C19B04D77466"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "7FB904C1-43D1-4583-8729-5D1B1746A54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.1",
"matchCriteriaId": "88111C46-3A34-4814-B892-71EB5A9B6743"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "16CAE2FB-FADC-4BF4-9115-D20D365051BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.3",
"matchCriteriaId": "7A7245FB-6FBE-4C09-80F5-18504CA623B3"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT212975",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212976",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212978",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212980",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}