Overview
- Description
- A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application may bypass Gatekeeper checks. Apple is aware of a report that this issue may have been actively exploited..
- Source
- product-security@apple.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Known exploits
Data from CISA
- Vulnerability name
- Apple macOS Unspecified Vulnerability
- Exploit added on
- Nov 3, 2021
- Exploit action due
- Nov 17, 2021
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA6AB65C-6C48-4C3B-BBAB-0F64618738A2", "versionEndIncluding": "10.15.5", "versionStartIncluding": "10.15" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF833C94-F436-407F-A3DA-32BE68A493C4" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E5A4D99-706D-4B12-9D41-13A480B3DF0D" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A654B8A2-FC30-4171-B0BB-366CD7ED4B6A" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F12CC8B5-C1EB-419E-8496-B9A3864656AD" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1F4BF7F-90D4-4668-B4E6-B06F4070F448" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FD7176C-F4D1-43A7-9E49-BA92CA0D9980" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2703DE0B-8A9E-4A9D-9AE8-028E22BF47CA" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C795B9-E58D-467C-83A8-2D45C792292F" }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E699CCC-31F5-458E-A59C-79B3AF143747", "versionEndExcluding": "11.3", "versionStartIncluding": "11.0" } ], "operator": "OR" } ] } ]