Vulnerability Details : CVE-2021-30919
An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted PDF may lead to arbitrary code execution.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-30919
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-30919
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-30919
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-30919
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-30919
-
https://www.zerodayinitiative.com/advisories/ZDI-22-357/
ZDI-22-357 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://support.apple.com/en-us/HT212874
About the security content of watchOS 8.1 - Apple SupportVendor Advisory
-
https://support.apple.com/en-us/HT212871
About the security content of Security Update 2021-007 Catalina - Apple SupportVendor Advisory
-
https://support.apple.com/en-us/HT212872
About the security content of macOS Big Sur 11.6.1 - Apple SupportVendor Advisory
-
https://support.apple.com/en-us/HT212867
About the security content of iOS 15.1 and iPadOS 15.1 - Apple SupportVendor Advisory
-
https://support.apple.com/en-us/HT212869
About the security content of macOS Monterey 12.0.1 - Apple SupportVendor Advisory
-
https://support.apple.com/en-us/HT212876
About the security content of tvOS 15.1 - Apple SupportVendor Advisory
-
https://support.apple.com/en-us/HT212868
About the security content of iOS 14.8.1 and iPadOS 14.8.1 - Apple SupportVendor Advisory
Jump to