CVE-2021-31010

Published Aug 24, 2021

Last updated 5 months ago

Overview

Description
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..
Source
product-security@apple.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5
Impact score
2.9
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:N/I:P/A:N

Known exploits

Data from CISA

Vulnerability name
Apple iOS, macOS, watchOS Sandbox Bypass Vulnerability
Exploit added on
Aug 25, 2022
Exploit action due
Sep 15, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-502

Social media

Hype score
Not currently trending

Configurations