Refine your search

52 vulnerabilities found for iOS by Apple

CERTFR-2025-AVI-0974
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Apple iOS et iPadOS. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iPadOS iPadOS versions antérieures à 18.7.2
Apple iOS iOS versions antérieures à 18.7.2
References
Bulletin de sécurité Apple 125633 2025-11-05 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 18.7.2",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.7.2",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-43441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43441"
    },
    {
      "name": "CVE-2025-43443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
    },
    {
      "name": "CVE-2025-43448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43448"
    },
    {
      "name": "CVE-2025-43431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
    },
    {
      "name": "CVE-2025-43496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43496"
    },
    {
      "name": "CVE-2025-43450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43450"
    },
    {
      "name": "CVE-2025-43384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43384"
    },
    {
      "name": "CVE-2025-43434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
    },
    {
      "name": "CVE-2025-43503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43503"
    },
    {
      "name": "CVE-2025-43458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
    },
    {
      "name": "CVE-2025-43423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43423"
    },
    {
      "name": "CVE-2025-43392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
    },
    {
      "name": "CVE-2025-43386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43386"
    },
    {
      "name": "CVE-2025-43493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43493"
    },
    {
      "name": "CVE-2025-43418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43418"
    },
    {
      "name": "CVE-2025-43435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43435"
    },
    {
      "name": "CVE-2025-43442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43442"
    },
    {
      "name": "CVE-2025-43377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43377"
    },
    {
      "name": "CVE-2025-43438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43438"
    },
    {
      "name": "CVE-2025-43429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
    },
    {
      "name": "CVE-2025-43385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43385"
    },
    {
      "name": "CVE-2025-43444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43444"
    },
    {
      "name": "CVE-2025-43365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43365"
    },
    {
      "name": "CVE-2025-43495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43495"
    },
    {
      "name": "CVE-2025-43499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43499"
    },
    {
      "name": "CVE-2025-43445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43445"
    },
    {
      "name": "CVE-2025-43399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43399"
    },
    {
      "name": "CVE-2025-43383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43383"
    },
    {
      "name": "CVE-2025-43507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43507"
    },
    {
      "name": "CVE-2025-43433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43433"
    },
    {
      "name": "CVE-2025-43454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43454"
    },
    {
      "name": "CVE-2025-43439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43439"
    },
    {
      "name": "CVE-2025-43389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43389"
    },
    {
      "name": "CVE-2025-43398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43398"
    }
  ],
  "initial_release_date": "2025-11-06T00:00:00",
  "last_revision_date": "2025-11-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0974",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apple iOS et iPadOS. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple iOS et iPadOS",
  "vendor_advisories": [
    {
      "published_at": "2025-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125633",
      "url": "https://support.apple.com/en-us/125633"
    }
  ]
}

CERTFR-2025-AVI-0961
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple macOS macOS Tahoe versions antérieures à 26.1
Apple iPadOS iPadOS versions antérieures à 26.1
Apple macOS macOS Sequoia versions antérieures à 15.7.2
Apple Safari Safari versions antérieures à 26.1
Apple Xcode Xcode versions antérieures à 26.1
Apple watchOS watchOS versions antérieures à 26.1
Apple iOS iOS versions antérieures à 26.1
Apple tvOS tvOS versions antérieures à 26.1
Apple macOS macOS Sonoma versions antérieures à 14.8.2
Apple visionOS visionOS versions antérieures à 26.1
References
Bulletin de sécurité Apple 125639 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125640 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125634 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125632 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125638 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125635 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125641 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125636 2025-11-03 vendor-advisory
Bulletin de sécurité Apple 125637 2025-11-03 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Xcode versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "Xcode",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "watchOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "tvOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 26.1",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-43292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
    },
    {
      "name": "CVE-2025-43505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43505"
    },
    {
      "name": "CVE-2025-43432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43432"
    },
    {
      "name": "CVE-2025-43372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
    },
    {
      "name": "CVE-2025-43426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43426"
    },
    {
      "name": "CVE-2025-43480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
    },
    {
      "name": "CVE-2025-43449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43449"
    },
    {
      "name": "CVE-2025-43348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43348"
    },
    {
      "name": "CVE-2025-43351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43351"
    },
    {
      "name": "CVE-2025-43373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43373"
    },
    {
      "name": "CVE-2025-43441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43441"
    },
    {
      "name": "CVE-2025-43443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
    },
    {
      "name": "CVE-2025-43476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43476"
    },
    {
      "name": "CVE-2025-30465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30465"
    },
    {
      "name": "CVE-2025-43448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43448"
    },
    {
      "name": "CVE-2025-43497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43497"
    },
    {
      "name": "CVE-2025-43446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43446"
    },
    {
      "name": "CVE-2025-43500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43500"
    },
    {
      "name": "CVE-2025-43431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
    },
    {
      "name": "CVE-2025-43452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43452"
    },
    {
      "name": "CVE-2025-43504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43504"
    },
    {
      "name": "CVE-2025-43467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43467"
    },
    {
      "name": "CVE-2025-43496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43496"
    },
    {
      "name": "CVE-2025-43420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43420"
    },
    {
      "name": "CVE-2025-43450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43450"
    },
    {
      "name": "CVE-2025-43406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43406"
    },
    {
      "name": "CVE-2025-43402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43402"
    },
    {
      "name": "CVE-2025-43384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43384"
    },
    {
      "name": "CVE-2025-43434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
    },
    {
      "name": "CVE-2025-43422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43422"
    },
    {
      "name": "CVE-2025-43503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43503"
    },
    {
      "name": "CVE-2025-43502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43502"
    },
    {
      "name": "CVE-2025-43440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43440"
    },
    {
      "name": "CVE-2024-43398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
    },
    {
      "name": "CVE-2025-43427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43427"
    },
    {
      "name": "CVE-2025-43394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43394"
    },
    {
      "name": "CVE-2025-43335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43335"
    },
    {
      "name": "CVE-2025-43458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
    },
    {
      "name": "CVE-2025-43411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43411"
    },
    {
      "name": "CVE-2025-43469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43469"
    },
    {
      "name": "CVE-2025-43498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43498"
    },
    {
      "name": "CVE-2025-43424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43424"
    },
    {
      "name": "CVE-2025-43423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43423"
    },
    {
      "name": "CVE-2025-43472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43472"
    },
    {
      "name": "CVE-2025-43459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43459"
    },
    {
      "name": "CVE-2025-43392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
    },
    {
      "name": "CVE-2025-43462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43462"
    },
    {
      "name": "CVE-2025-43401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43401"
    },
    {
      "name": "CVE-2025-43386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43386"
    },
    {
      "name": "CVE-2025-43493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43493"
    },
    {
      "name": "CVE-2025-43481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43481"
    },
    {
      "name": "CVE-2025-43405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43405"
    },
    {
      "name": "CVE-2025-43506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43506"
    },
    {
      "name": "CVE-2025-43322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43322"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-43400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43400"
    },
    {
      "name": "CVE-2025-43468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43468"
    },
    {
      "name": "CVE-2025-43395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43395"
    },
    {
      "name": "CVE-2025-43421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43421"
    },
    {
      "name": "CVE-2025-43435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43435"
    },
    {
      "name": "CVE-2025-43464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43464"
    },
    {
      "name": "CVE-2025-43442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43442"
    },
    {
      "name": "CVE-2025-43377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43377"
    },
    {
      "name": "CVE-2025-43438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43438"
    },
    {
      "name": "CVE-2025-43460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43460"
    },
    {
      "name": "CVE-2025-43429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
    },
    {
      "name": "CVE-2025-43407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43407"
    },
    {
      "name": "CVE-2025-43334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43334"
    },
    {
      "name": "CVE-2025-43414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43414"
    },
    {
      "name": "CVE-2025-43385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43385"
    },
    {
      "name": "CVE-2025-43444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43444"
    },
    {
      "name": "CVE-2025-43404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43404"
    },
    {
      "name": "CVE-2025-43495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43495"
    },
    {
      "name": "CVE-2025-43465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43465"
    },
    {
      "name": "CVE-2025-43461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43461"
    },
    {
      "name": "CVE-2025-43294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
    },
    {
      "name": "CVE-2025-43390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43390"
    },
    {
      "name": "CVE-2025-43499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43499"
    },
    {
      "name": "CVE-2025-43350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43350"
    },
    {
      "name": "CVE-2025-43391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43391"
    },
    {
      "name": "CVE-2025-43378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43378"
    },
    {
      "name": "CVE-2025-43473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43473"
    },
    {
      "name": "CVE-2025-43445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43445"
    },
    {
      "name": "CVE-2025-43338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43338"
    },
    {
      "name": "CVE-2025-43409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43409"
    },
    {
      "name": "CVE-2025-43399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43399"
    },
    {
      "name": "CVE-2025-43383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43383"
    },
    {
      "name": "CVE-2025-43474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43474"
    },
    {
      "name": "CVE-2025-43471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43471"
    },
    {
      "name": "CVE-2025-43387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43387"
    },
    {
      "name": "CVE-2025-43479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43479"
    },
    {
      "name": "CVE-2025-43447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43447"
    },
    {
      "name": "CVE-2025-43477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43477"
    },
    {
      "name": "CVE-2025-43413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43413"
    },
    {
      "name": "CVE-2025-43507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43507"
    },
    {
      "name": "CVE-2025-43336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43336"
    },
    {
      "name": "CVE-2025-43433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43433"
    },
    {
      "name": "CVE-2025-43430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43430"
    },
    {
      "name": "CVE-2025-43337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
    },
    {
      "name": "CVE-2025-43380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43380"
    },
    {
      "name": "CVE-2025-43397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43397"
    },
    {
      "name": "CVE-2025-43455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43455"
    },
    {
      "name": "CVE-2025-53906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
    },
    {
      "name": "CVE-2025-43412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43412"
    },
    {
      "name": "CVE-2025-43388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43388"
    },
    {
      "name": "CVE-2025-43396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43396"
    },
    {
      "name": "CVE-2025-43454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43454"
    },
    {
      "name": "CVE-2025-43439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43439"
    },
    {
      "name": "CVE-2025-43381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43381"
    },
    {
      "name": "CVE-2025-43382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43382"
    },
    {
      "name": "CVE-2025-43466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43466"
    },
    {
      "name": "CVE-2025-43364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43364"
    },
    {
      "name": "CVE-2025-43393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43393"
    },
    {
      "name": "CVE-2025-43389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43389"
    },
    {
      "name": "CVE-2025-43457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43457"
    },
    {
      "name": "CVE-2025-43361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43361"
    },
    {
      "name": "CVE-2025-43398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43398"
    },
    {
      "name": "CVE-2025-31199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31199"
    },
    {
      "name": "CVE-2025-43408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43408"
    },
    {
      "name": "CVE-2025-43379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43379"
    },
    {
      "name": "CVE-2025-6442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
    },
    {
      "name": "CVE-2025-43425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43425"
    },
    {
      "name": "CVE-2025-43478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43478"
    },
    {
      "name": "CVE-2025-43436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43436"
    },
    {
      "name": "CVE-2024-49761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
    },
    {
      "name": "CVE-2025-43463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43463"
    }
  ],
  "initial_release_date": "2025-11-04T00:00:00",
  "last_revision_date": "2025-11-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0961",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125639",
      "url": "https://support.apple.com/en-us/125639"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125640",
      "url": "https://support.apple.com/en-us/125640"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125634",
      "url": "https://support.apple.com/en-us/125634"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125632",
      "url": "https://support.apple.com/en-us/125632"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125638",
      "url": "https://support.apple.com/en-us/125638"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125635",
      "url": "https://support.apple.com/en-us/125635"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125641",
      "url": "https://support.apple.com/en-us/125641"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125636",
      "url": "https://support.apple.com/en-us/125636"
    },
    {
      "published_at": "2025-11-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125637",
      "url": "https://support.apple.com/en-us/125637"
    }
  ]
}

CERTFR-2025-AVI-0831
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iPadOS iPadOS versions antérieures à 26.0.1
Apple iOS iOS versions antérieures à 18.7.1
Apple macOS macOS Tahoe versions antérieures à 26.0.1
Apple macOS macOS Sonoma versions antérieures à 14.8.1
Apple iPadOS iPadOS versions antérieures à 18.7.1
Apple iOS iOS versions antérieures à 26.0.1
Apple visionOS visionOS versions antérieures à 26.0.1
Apple macOS macOS Sequoia versions antérieures à 15.7.1
References
Bulletin de sécurité Apple 125327 2025-09-29 vendor-advisory
Bulletin de sécurité Apple 125330 2025-09-29 vendor-advisory
Bulletin de sécurité Apple 125329 2025-09-29 vendor-advisory
Bulletin de sécurité Apple 125338 2025-09-29 vendor-advisory
Bulletin de sécurité Apple 125328 2025-09-29 vendor-advisory
Bulletin de sécurité Apple 125326 2025-09-29 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 26.0.1",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.7.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26.0.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 18.7.1",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 26.0.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 26.0.1",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-43400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43400"
    }
  ],
  "initial_release_date": "2025-09-30T00:00:00",
  "last_revision_date": "2025-09-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0831",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Apple. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-09-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125327",
      "url": "https://support.apple.com/en-us/125327"
    },
    {
      "published_at": "2025-09-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125330",
      "url": "https://support.apple.com/en-us/125330"
    },
    {
      "published_at": "2025-09-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125329",
      "url": "https://support.apple.com/en-us/125329"
    },
    {
      "published_at": "2025-09-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125338",
      "url": "https://support.apple.com/en-us/125338"
    },
    {
      "published_at": "2025-09-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125328",
      "url": "https://support.apple.com/en-us/125328"
    },
    {
      "published_at": "2025-09-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125326",
      "url": "https://support.apple.com/en-us/125326"
    }
  ]
}

CERTFR-2025-AVI-0791
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.

Apple indique que la vulnérabilité CVE-2025-43300 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iPadOS iPadOS versions antérieures à 26
Apple watchOS watchOS versions antérieures à 26
Apple iOS iOS versions 16.x antérieures à 16.7.12
Apple macOS macOS Sonoma versions antérieures à 14.8
Apple tvOS tvOS versions antérieures à 26
Apple macOS macOS Sequoia versions antérieures à 15.7
Apple iOS iOS versions antérieures à 26
Apple iOS iOS versions 15.x antérieures à 15.8.5
Apple iOS iOS versions 18.x antérieures à 18.7
Apple visionOS visionOS versions antérieures à 26
Apple Xcode Xcode versions antérieures à 26
Apple Safari Safari versions antérieures à 26
Apple iPadOS iPadOS versions 15.x antérieures à 15.8.5
Apple iPadOS iPadOS versions 16.x antérieures à 16.7.12
Apple macOS macOS Tahoe versions antérieures à 26
Apple iPadOS iPadOS versions 18.x antérieures à 18.7
References
Bulletin de sécurité Apple 125112 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125116 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125110 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125115 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125141 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125117 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125114 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125108 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125111 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125109 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125142 2025-09-15 vendor-advisory
Bulletin de sécurité Apple 125113 2025-09-15 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "watchOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions 16.x ant\u00e9rieures \u00e0 16.7.12",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "tvOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions 15.x ant\u00e9rieures \u00e0 15.8.5",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions 18.x ant\u00e9rieures \u00e0 18.7",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Xcode versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "Xcode",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions 15.x ant\u00e9rieures \u00e0 15.8.5",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions 16.x ant\u00e9rieures \u00e0 16.7.12",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions 18.x ant\u00e9rieures \u00e0 18.7",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-43292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
    },
    {
      "name": "CVE-2025-43372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
    },
    {
      "name": "CVE-2025-43332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43332"
    },
    {
      "name": "CVE-2025-31270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31270"
    },
    {
      "name": "CVE-2025-43362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43362"
    },
    {
      "name": "CVE-2025-43319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43319"
    },
    {
      "name": "CVE-2025-43340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43340"
    },
    {
      "name": "CVE-2025-43327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43327"
    },
    {
      "name": "CVE-2025-30468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30468"
    },
    {
      "name": "CVE-2025-43359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43359"
    },
    {
      "name": "CVE-2025-43262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43262"
    },
    {
      "name": "CVE-2024-27280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
    },
    {
      "name": "CVE-2025-31269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31269"
    },
    {
      "name": "CVE-2025-43354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43354"
    },
    {
      "name": "CVE-2025-43326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43326"
    },
    {
      "name": "CVE-2025-43204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43204"
    },
    {
      "name": "CVE-2025-43273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43273"
    },
    {
      "name": "CVE-2025-43347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43347"
    },
    {
      "name": "CVE-2025-43302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43302"
    },
    {
      "name": "CVE-2025-43321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43321"
    },
    {
      "name": "CVE-2025-31254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31254"
    },
    {
      "name": "CVE-2025-43299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43299"
    },
    {
      "name": "CVE-2025-43316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43316"
    },
    {
      "name": "CVE-2025-43263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43263"
    },
    {
      "name": "CVE-2025-31255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31255"
    },
    {
      "name": "CVE-2025-43375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43375"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2025-43355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43355"
    },
    {
      "name": "CVE-2025-43207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43207"
    },
    {
      "name": "CVE-2025-43285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43285"
    },
    {
      "name": "CVE-2025-43370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43370"
    },
    {
      "name": "CVE-2025-43312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43312"
    },
    {
      "name": "CVE-2025-43317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43317"
    },
    {
      "name": "CVE-2025-31271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31271"
    },
    {
      "name": "CVE-2025-43208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43208"
    },
    {
      "name": "CVE-2025-43283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43283"
    },
    {
      "name": "CVE-2025-48384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
    },
    {
      "name": "CVE-2025-43277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43277"
    },
    {
      "name": "CVE-2025-43325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43325"
    },
    {
      "name": "CVE-2025-43231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43231"
    },
    {
      "name": "CVE-2025-24197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24197"
    },
    {
      "name": "CVE-2025-43358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43358"
    },
    {
      "name": "CVE-2025-43328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43328"
    },
    {
      "name": "CVE-2025-43368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
    },
    {
      "name": "CVE-2025-43315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43315"
    },
    {
      "name": "CVE-2025-43331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43331"
    },
    {
      "name": "CVE-2025-43310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43310"
    },
    {
      "name": "CVE-2025-43333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43333"
    },
    {
      "name": "CVE-2025-43203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43203"
    },
    {
      "name": "CVE-2025-43307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43307"
    },
    {
      "name": "CVE-2025-43297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43297"
    },
    {
      "name": "CVE-2025-43190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43190"
    },
    {
      "name": "CVE-2025-24088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24088"
    },
    {
      "name": "CVE-2025-43293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43293"
    },
    {
      "name": "CVE-2025-43343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43343"
    },
    {
      "name": "CVE-2025-43294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
    },
    {
      "name": "CVE-2025-43286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43286"
    },
    {
      "name": "CVE-2025-43353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43353"
    },
    {
      "name": "CVE-2025-43356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43356"
    },
    {
      "name": "CVE-2025-43330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43330"
    },
    {
      "name": "CVE-2025-43272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
    },
    {
      "name": "CVE-2025-31259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31259"
    },
    {
      "name": "CVE-2025-31268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31268"
    },
    {
      "name": "CVE-2025-43366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43366"
    },
    {
      "name": "CVE-2025-43298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43298"
    },
    {
      "name": "CVE-2025-43369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43369"
    },
    {
      "name": "CVE-2025-43308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43308"
    },
    {
      "name": "CVE-2025-43346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43346"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2025-43337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
    },
    {
      "name": "CVE-2025-24133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24133"
    },
    {
      "name": "CVE-2025-43279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43279"
    },
    {
      "name": "CVE-2025-43314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43314"
    },
    {
      "name": "CVE-2025-43300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43300"
    },
    {
      "name": "CVE-2025-43342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
    },
    {
      "name": "CVE-2025-43349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43349"
    },
    {
      "name": "CVE-2025-43341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43341"
    },
    {
      "name": "CVE-2025-43301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43301"
    },
    {
      "name": "CVE-2025-43318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43318"
    },
    {
      "name": "CVE-2025-43344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43344"
    },
    {
      "name": "CVE-2025-43311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43311"
    },
    {
      "name": "CVE-2025-43287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43287"
    },
    {
      "name": "CVE-2025-43303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43303"
    },
    {
      "name": "CVE-2025-43304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43304"
    },
    {
      "name": "CVE-2025-43291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43291"
    },
    {
      "name": "CVE-2025-43329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43329"
    },
    {
      "name": "CVE-2025-43357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43357"
    },
    {
      "name": "CVE-2025-43367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43367"
    },
    {
      "name": "CVE-2025-43371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43371"
    },
    {
      "name": "CVE-2025-43295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43295"
    },
    {
      "name": "CVE-2025-43305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43305"
    }
  ],
  "initial_release_date": "2025-09-16T00:00:00",
  "last_revision_date": "2025-09-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0791",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-43300 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125112",
      "url": "https://support.apple.com/en-us/125112"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125116",
      "url": "https://support.apple.com/en-us/125116"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125110",
      "url": "https://support.apple.com/en-us/125110"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125115",
      "url": "https://support.apple.com/en-us/125115"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125141",
      "url": "https://support.apple.com/en-us/125141"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125117",
      "url": "https://support.apple.com/en-us/125117"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125114",
      "url": "https://support.apple.com/en-us/125114"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125108",
      "url": "https://support.apple.com/en-us/125108"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125111",
      "url": "https://support.apple.com/en-us/125111"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125109",
      "url": "https://support.apple.com/en-us/125109"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125142",
      "url": "https://support.apple.com/en-us/125142"
    },
    {
      "published_at": "2025-09-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 125113",
      "url": "https://support.apple.com/en-us/125113"
    }
  ]
}

CERTFR-2025-AVI-0716
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Apple indique que la vulnérabilité CVE-2025-43300 est activement exploitée dans le cadre d'attaques ciblées.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple macOS macOS Sonoma versions antérieures à 14.7.8
Apple iPadOS iPadOS versions antérieures à 17.7.10
Apple iOS iOS versions antérieures à 18.6.2
Apple iPadOS iPadOS versions antérieures à 18.6.2
Apple macOS macOS Ventura versions antérieures à 13.7.8
Apple macOS macOS Sequoia versions antérieures à 15.6.1
References
Bulletin de sécurité Apple 124925 2025-08-20 vendor-advisory
Bulletin de sécurité Apple 124928 2025-08-20 vendor-advisory
Bulletin de sécurité Apple 124926 2025-08-20 vendor-advisory
Bulletin de sécurité Apple 124929 2025-08-20 vendor-advisory
Bulletin de sécurité Apple 124927 2025-08-20 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.8",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.10",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.6.2",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 18.6.2",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.8",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.6.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-43300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43300"
    }
  ],
  "initial_release_date": "2025-08-21T00:00:00",
  "last_revision_date": "2025-08-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0716",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Apple. Elle permet \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-43300 est activement exploit\u00e9e dans le cadre d\u0027attaques cibl\u00e9es.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124925",
      "url": "https://support.apple.com/en-us/124925"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124928",
      "url": "https://support.apple.com/en-us/124928"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124926",
      "url": "https://support.apple.com/en-us/124926"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124929",
      "url": "https://support.apple.com/en-us/124929"
    },
    {
      "published_at": "2025-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124927",
      "url": "https://support.apple.com/en-us/124927"
    }
  ]
}

CERTFR-2025-AVI-0640
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.

Google indique que la vulnérabilité CVE-2025-6558 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple N/A tvOS versions antérieures à 18.6
Apple iOS iOS versions antérieures à 18.6
Apple N/A visionOS versions antérieures à 2.6
Apple iPadOS iPadOS versions 18.x antérieures à 18.6
Apple macOS macOS Sequoia versions antérieures à 15.6
Apple iPadOS iPadOS versions antérieures à 17.7.9
Apple macOS macOS Ventura versions antérieures à 13.7.7
Apple macOS macOS Sonoma versions antérieures à 14.7.7
Apple N/A watchOS versions antérieures à 11.6
References
Bulletin de sécurité Apple 124150 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124155 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124149 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124151 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124147 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124153 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124154 2025-07-29 vendor-advisory
Bulletin de sécurité Apple 124148 2025-07-29 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 18.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.6",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 2.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions 18.x ant\u00e9rieures \u00e0 18.6",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.6",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.9",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.7",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.7",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS versions ant\u00e9rieures \u00e0 11.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-24224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24224"
    },
    {
      "name": "CVE-2025-43241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43241"
    },
    {
      "name": "CVE-2025-31277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31277"
    },
    {
      "name": "CVE-2025-43206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43206"
    },
    {
      "name": "CVE-2025-43222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43222"
    },
    {
      "name": "CVE-2025-43251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43251"
    },
    {
      "name": "CVE-2025-31273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31273"
    },
    {
      "name": "CVE-2025-43191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43191"
    },
    {
      "name": "CVE-2025-43189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43189"
    },
    {
      "name": "CVE-2025-43234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43234"
    },
    {
      "name": "CVE-2025-43254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43254"
    },
    {
      "name": "CVE-2025-43245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43245"
    },
    {
      "name": "CVE-2025-43214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43214"
    },
    {
      "name": "CVE-2025-43212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43212"
    },
    {
      "name": "CVE-2025-43274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43274"
    },
    {
      "name": "CVE-2025-43192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43192"
    },
    {
      "name": "CVE-2025-43266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43266"
    },
    {
      "name": "CVE-2025-43273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43273"
    },
    {
      "name": "CVE-2025-43275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43275"
    },
    {
      "name": "CVE-2025-43224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43224"
    },
    {
      "name": "CVE-2025-43252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43252"
    },
    {
      "name": "CVE-2025-43239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43239"
    },
    {
      "name": "CVE-2025-43197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43197"
    },
    {
      "name": "CVE-2025-43235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43235"
    },
    {
      "name": "CVE-2025-43243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43243"
    },
    {
      "name": "CVE-2025-43240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43240"
    },
    {
      "name": "CVE-2025-43256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43256"
    },
    {
      "name": "CVE-2025-43236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43236"
    },
    {
      "name": "CVE-2025-31279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31279"
    },
    {
      "name": "CVE-2025-43202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43202"
    },
    {
      "name": "CVE-2025-43259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43259"
    },
    {
      "name": "CVE-2025-43270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43270"
    },
    {
      "name": "CVE-2025-43210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43210"
    },
    {
      "name": "CVE-2025-43193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43193"
    },
    {
      "name": "CVE-2025-43227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43227"
    },
    {
      "name": "CVE-2025-31278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31278"
    },
    {
      "name": "CVE-2025-43237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43237"
    },
    {
      "name": "CVE-2025-43225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43225"
    },
    {
      "name": "CVE-2025-31243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31243"
    },
    {
      "name": "CVE-2025-43253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43253"
    },
    {
      "name": "CVE-2025-43217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43217"
    },
    {
      "name": "CVE-2025-43257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43257"
    },
    {
      "name": "CVE-2025-43277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43277"
    },
    {
      "name": "CVE-2025-31281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31281"
    },
    {
      "name": "CVE-2025-43219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43219"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-43233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43233"
    },
    {
      "name": "CVE-2025-24220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24220"
    },
    {
      "name": "CVE-2025-24119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24119"
    },
    {
      "name": "CVE-2025-31275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31275"
    },
    {
      "name": "CVE-2025-31229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31229"
    },
    {
      "name": "CVE-2025-43199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43199"
    },
    {
      "name": "CVE-2025-43220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43220"
    },
    {
      "name": "CVE-2025-31280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31280"
    },
    {
      "name": "CVE-2025-43255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43255"
    },
    {
      "name": "CVE-2025-43229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43229"
    },
    {
      "name": "CVE-2025-43211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43211"
    },
    {
      "name": "CVE-2025-43209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43209"
    },
    {
      "name": "CVE-2025-43186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43186"
    },
    {
      "name": "CVE-2025-6558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
    },
    {
      "name": "CVE-2025-43249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43249"
    },
    {
      "name": "CVE-2025-43228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43228"
    },
    {
      "name": "CVE-2025-43188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43188"
    },
    {
      "name": "CVE-2025-43265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43265"
    },
    {
      "name": "CVE-2025-43264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43264"
    },
    {
      "name": "CVE-2025-43268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43268"
    },
    {
      "name": "CVE-2025-43248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43248"
    },
    {
      "name": "CVE-2025-43247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43247"
    },
    {
      "name": "CVE-2025-43213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43213"
    },
    {
      "name": "CVE-2025-43216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43216"
    },
    {
      "name": "CVE-2025-43232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43232"
    },
    {
      "name": "CVE-2025-31276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31276"
    },
    {
      "name": "CVE-2025-43261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43261"
    },
    {
      "name": "CVE-2025-43276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43276"
    },
    {
      "name": "CVE-2025-43226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43226"
    },
    {
      "name": "CVE-2025-43223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43223"
    },
    {
      "name": "CVE-2025-43246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43246"
    },
    {
      "name": "CVE-2025-43260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43260"
    },
    {
      "name": "CVE-2025-43215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43215"
    },
    {
      "name": "CVE-2025-43238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43238"
    },
    {
      "name": "CVE-2025-43198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43198"
    },
    {
      "name": "CVE-2025-43230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43230"
    },
    {
      "name": "CVE-2025-43250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43250"
    },
    {
      "name": "CVE-2025-43196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43196"
    },
    {
      "name": "CVE-2025-43218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43218"
    },
    {
      "name": "CVE-2025-24188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24188"
    },
    {
      "name": "CVE-2025-7424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
    },
    {
      "name": "CVE-2025-43194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43194"
    },
    {
      "name": "CVE-2025-43267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43267"
    },
    {
      "name": "CVE-2025-43195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43195"
    },
    {
      "name": "CVE-2025-43185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43185"
    },
    {
      "name": "CVE-2025-43184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43184"
    },
    {
      "name": "CVE-2025-43244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43244"
    },
    {
      "name": "CVE-2025-43187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43187"
    },
    {
      "name": "CVE-2025-43221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43221"
    }
  ],
  "initial_release_date": "2025-07-30T00:00:00",
  "last_revision_date": "2025-07-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0640",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-30T00:00:00.000000"
    },
    {
      "description": "Google indique que la vuln\u00e9rabilit\u00e9 CVE-2025-6558 est activement exploit\u00e9e.",
      "revision_date": "2025-07-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2025-6558 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124150",
      "url": "https://support.apple.com/en-us/124150"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124155",
      "url": "https://support.apple.com/en-us/124155"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124149",
      "url": "https://support.apple.com/en-us/124149"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124151",
      "url": "https://support.apple.com/en-us/124151"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124147",
      "url": "https://support.apple.com/en-us/124147"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124153",
      "url": "https://support.apple.com/en-us/124153"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124154",
      "url": "https://support.apple.com/en-us/124154"
    },
    {
      "published_at": "2025-07-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 124148",
      "url": "https://support.apple.com/en-us/124148"
    }
  ]
}

CERTFR-2025-AVI-0393
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Apple indique que la vulnérabilité CVE-2025-31200 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple macOS macOS Sonoma versions antérieures à 14.7.6
Apple macOS macOS Sequoia versions antérieures à 15.5
Apple iPadOS iPadOS versions 18.x antérieures à 18.5
Apple N/A watchOS versions antérieures à 11.5
Apple Safari Safari versions antérieures à 18.5
Apple N/A visionOS versions antérieures à 2.5
Apple macOS macOS Ventura versions antérieures à 13.7.6
Apple iPadOS iPadOS versions antérieures à 17.7.7
Apple iOS iOS versions antérieures à 18.5
Apple N/A tvOS versions antérieures à 18.5
References
Bulletin de sécurité Apple 122404 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122717 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122405 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122716 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122718 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122721 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122720 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122719 2025-05-12 vendor-advisory
Bulletin de sécurité Apple 122722 2025-05-12 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.6",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.5",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions 18.x ant\u00e9rieures \u00e0 18.5",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS versions ant\u00e9rieures \u00e0 11.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 18.5",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 2.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.6",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.7",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.5",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 18.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-31240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31240"
    },
    {
      "name": "CVE-2025-31247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31247"
    },
    {
      "name": "CVE-2025-26465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
    },
    {
      "name": "CVE-2025-31221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31221"
    },
    {
      "name": "CVE-2025-31209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31209"
    },
    {
      "name": "CVE-2025-24155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24155"
    },
    {
      "name": "CVE-2025-31204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
    },
    {
      "name": "CVE-2025-31227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31227"
    },
    {
      "name": "CVE-2025-31218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31218"
    },
    {
      "name": "CVE-2025-31228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31228"
    },
    {
      "name": "CVE-2025-31226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31226"
    },
    {
      "name": "CVE-2025-31212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31212"
    },
    {
      "name": "CVE-2025-26466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
    },
    {
      "name": "CVE-2025-31208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31208"
    },
    {
      "name": "CVE-2024-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
    },
    {
      "name": "CVE-2025-24144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24144"
    },
    {
      "name": "CVE-2025-30440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30440"
    },
    {
      "name": "CVE-2025-24142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24142"
    },
    {
      "name": "CVE-2025-24225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24225"
    },
    {
      "name": "CVE-2025-31219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31219"
    },
    {
      "name": "CVE-2025-31251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31251"
    },
    {
      "name": "CVE-2025-31217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31217"
    },
    {
      "name": "CVE-2025-31241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31241"
    },
    {
      "name": "CVE-2025-31196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31196"
    },
    {
      "name": "CVE-2025-31234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31234"
    },
    {
      "name": "CVE-2025-31245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31245"
    },
    {
      "name": "CVE-2025-31220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31220"
    },
    {
      "name": "CVE-2025-30442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30442"
    },
    {
      "name": "CVE-2025-31235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31235"
    },
    {
      "name": "CVE-2025-31200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31200"
    },
    {
      "name": "CVE-2025-24097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24097"
    },
    {
      "name": "CVE-2025-30448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30448"
    },
    {
      "name": "CVE-2025-31249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31249"
    },
    {
      "name": "CVE-2025-24274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24274"
    },
    {
      "name": "CVE-2025-31238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31238"
    },
    {
      "name": "CVE-2025-24220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24220"
    },
    {
      "name": "CVE-2025-31210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31210"
    },
    {
      "name": "CVE-2025-31207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31207"
    },
    {
      "name": "CVE-2025-31242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31242"
    },
    {
      "name": "CVE-2025-31206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
    },
    {
      "name": "CVE-2025-31244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31244"
    },
    {
      "name": "CVE-2025-24259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24259"
    },
    {
      "name": "CVE-2025-31259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31259"
    },
    {
      "name": "CVE-2025-31232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31232"
    },
    {
      "name": "CVE-2025-31250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31250"
    },
    {
      "name": "CVE-2025-31223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31223"
    },
    {
      "name": "CVE-2025-31224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31224"
    },
    {
      "name": "CVE-2025-31214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31214"
    },
    {
      "name": "CVE-2025-31246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31246"
    },
    {
      "name": "CVE-2025-31213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31213"
    },
    {
      "name": "CVE-2025-31256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31256"
    },
    {
      "name": "CVE-2025-24258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24258"
    },
    {
      "name": "CVE-2025-24111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24111"
    },
    {
      "name": "CVE-2025-24222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24222"
    },
    {
      "name": "CVE-2025-31225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31225"
    },
    {
      "name": "CVE-2025-31205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31205"
    },
    {
      "name": "CVE-2025-24223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
    },
    {
      "name": "CVE-2025-24213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213"
    },
    {
      "name": "CVE-2025-31260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31260"
    },
    {
      "name": "CVE-2025-31236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31236"
    },
    {
      "name": "CVE-2025-31222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31222"
    },
    {
      "name": "CVE-2025-31237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31237"
    },
    {
      "name": "CVE-2025-31257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
    },
    {
      "name": "CVE-2025-31239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31239"
    },
    {
      "name": "CVE-2025-31233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31233"
    },
    {
      "name": "CVE-2025-30453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30453"
    },
    {
      "name": "CVE-2025-31258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31258"
    },
    {
      "name": "CVE-2025-31253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31253"
    },
    {
      "name": "CVE-2025-31215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
    },
    {
      "name": "CVE-2025-30443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30443"
    }
  ],
  "initial_release_date": "2025-05-13T00:00:00",
  "last_revision_date": "2025-05-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0393",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-31200 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122404",
      "url": "https://support.apple.com/en-us/122404"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122717",
      "url": "https://support.apple.com/en-us/122717"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122405",
      "url": "https://support.apple.com/en-us/122405"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122716",
      "url": "https://support.apple.com/en-us/122716"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122718",
      "url": "https://support.apple.com/en-us/122718"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122721",
      "url": "https://support.apple.com/en-us/122721"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122720",
      "url": "https://support.apple.com/en-us/122720"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122719",
      "url": "https://support.apple.com/en-us/122719"
    },
    {
      "published_at": "2025-05-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122722",
      "url": "https://support.apple.com/en-us/122722"
    }
  ]
}

CERTFR-2025-AVI-0325
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un contournement de la politique de sécurité.

Apple indique que les vulnérabilités CVE-2025-31200 et CVE-2025-31201 sont activement exploitées.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple tvOS tvOS versions antérieures à 18.4.1
Apple macOS macOS Sequoia versions antérieures à 15.4.1
Apple visionOS visionOS versions antérieures à 2.4.1
Apple iOS iOS et iPadOS versions antérieures à 18.4.1
References
Bulletin de sécurité Apple 122282 2025-04-16 vendor-advisory
Bulletin de sécurité Apple 122402 2025-04-16 vendor-advisory
Bulletin de sécurité Apple 122400 2025-04-16 vendor-advisory
Bulletin de sécurité Apple 122401 2025-04-16 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 18.4.1",
      "product": {
        "name": "tvOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.4.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 2.4.1",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 18.4.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-31200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31200"
    },
    {
      "name": "CVE-2025-31201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31201"
    }
  ],
  "initial_release_date": "2025-04-17T00:00:00",
  "last_revision_date": "2025-04-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0325",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et un contournement de la politique de s\u00e9curit\u00e9.\n\nApple indique que les vuln\u00e9rabilit\u00e9s CVE-2025-31200 et CVE-2025-31201 sont activement exploit\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-04-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122282",
      "url": "https://support.apple.com/en-us/122282"
    },
    {
      "published_at": "2025-04-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122402",
      "url": "https://support.apple.com/en-us/122402"
    },
    {
      "published_at": "2025-04-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122400",
      "url": "https://support.apple.com/en-us/122400"
    },
    {
      "published_at": "2025-04-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122401",
      "url": "https://support.apple.com/en-us/122401"
    }
  ]
}

CERTFR-2025-AVI-0258
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.

Apple indique que les vulnérabilités CVE-2025-24200 et CVE-2025-24201 sont activement exploitées.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iPadOS iPadOS versions antérieures à 17.7.6
Apple iOS iOS versions antérieures à 18.4
Apple N/A Xcode versions antérieures à 16.3
Apple iOS iOS versions antérieures à 16.7.11
Apple visionOS visionOS versions antérieures à 2.4
Apple macOS macOS Ventura versions antérieures à 13.7.5
Apple tvOS tvOS versions antérieures à 18.4
Apple macOS macOS Sequoia versions antérieures à 15.4
Apple macOS macOS Sonoma versions antérieures à 14.7.5
Apple iPadOS iPadOS versions antérieures à 18.4
Apple iOS iOS versions antérieures à 15.8.4
Apple iPadOS iPadOS versions antérieures à 16.7.11
Apple iPadOS iPadOS versions antérieures à 15.8.4
Apple Safari Safari versions antérieures à 18.4
References
Bulletin de sécurité Apple 122378 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122371 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122380 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122379 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122345 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122373 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122372 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122377 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122346 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122374 2025-03-31 vendor-advisory
Bulletin de sécurité Apple 122375 2025-03-31 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.6",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.4",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Xcode versions ant\u00e9rieures \u00e0 16.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 16.7.11",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 2.4",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.5",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 18.4",
      "product": {
        "name": "tvOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.4",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.5",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 18.4",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 15.8.4",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 16.7.11",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 15.8.4",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 18.4",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-24206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24206"
    },
    {
      "name": "CVE-2024-54508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
    },
    {
      "name": "CVE-2025-24205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24205"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2025-24266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24266"
    },
    {
      "name": "CVE-2024-54502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
    },
    {
      "name": "CVE-2025-24273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24273"
    },
    {
      "name": "CVE-2025-30425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30425"
    },
    {
      "name": "CVE-2025-24200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24200"
    },
    {
      "name": "CVE-2025-24228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24228"
    },
    {
      "name": "CVE-2025-24210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24210"
    },
    {
      "name": "CVE-2025-24265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24265"
    },
    {
      "name": "CVE-2025-24260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24260"
    },
    {
      "name": "CVE-2025-24249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24249"
    },
    {
      "name": "CVE-2025-30455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30455"
    },
    {
      "name": "CVE-2025-30471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30471"
    },
    {
      "name": "CVE-2025-30465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30465"
    },
    {
      "name": "CVE-2025-24253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24253"
    },
    {
      "name": "CVE-2025-30447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30447"
    },
    {
      "name": "CVE-2025-30445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30445"
    },
    {
      "name": "CVE-2025-24207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24207"
    },
    {
      "name": "CVE-2025-24240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24240"
    },
    {
      "name": "CVE-2025-24229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24229"
    },
    {
      "name": "CVE-2025-24246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24246"
    },
    {
      "name": "CVE-2025-24182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24182"
    },
    {
      "name": "CVE-2025-24279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24279"
    },
    {
      "name": "CVE-2025-24271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24271"
    },
    {
      "name": "CVE-2025-30469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30469"
    },
    {
      "name": "CVE-2025-24178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24178"
    },
    {
      "name": "CVE-2025-30463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30463"
    },
    {
      "name": "CVE-2025-30457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30457"
    },
    {
      "name": "CVE-2025-24126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24126"
    },
    {
      "name": "CVE-2025-24204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24204"
    },
    {
      "name": "CVE-2025-24216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-30462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30462"
    },
    {
      "name": "CVE-2025-30467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30467"
    },
    {
      "name": "CVE-2025-24262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24262"
    },
    {
      "name": "CVE-2025-24270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24270"
    },
    {
      "name": "CVE-2025-24194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24194"
    },
    {
      "name": "CVE-2025-24267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24267"
    },
    {
      "name": "CVE-2025-24235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24235"
    },
    {
      "name": "CVE-2025-24193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24193"
    },
    {
      "name": "CVE-2025-24281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24281"
    },
    {
      "name": "CVE-2025-24221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24221"
    },
    {
      "name": "CVE-2025-24257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24257"
    },
    {
      "name": "CVE-2025-31187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31187"
    },
    {
      "name": "CVE-2025-30449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30449"
    },
    {
      "name": "CVE-2025-24263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24263"
    },
    {
      "name": "CVE-2025-24191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24191"
    },
    {
      "name": "CVE-2025-30464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30464"
    },
    {
      "name": "CVE-2025-30429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30429"
    },
    {
      "name": "CVE-2025-24280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24280"
    },
    {
      "name": "CVE-2025-30452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30452"
    },
    {
      "name": "CVE-2025-24085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24085"
    },
    {
      "name": "CVE-2025-24203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24203"
    },
    {
      "name": "CVE-2025-24247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24247"
    },
    {
      "name": "CVE-2025-24211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24211"
    },
    {
      "name": "CVE-2025-24198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24198"
    },
    {
      "name": "CVE-2025-24131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24131"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2025-24164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24164"
    },
    {
      "name": "CVE-2025-24255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24255"
    },
    {
      "name": "CVE-2025-24283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24283"
    },
    {
      "name": "CVE-2024-48958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48958"
    },
    {
      "name": "CVE-2025-24170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24170"
    },
    {
      "name": "CVE-2025-24093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24093"
    },
    {
      "name": "CVE-2025-24173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24173"
    },
    {
      "name": "CVE-2025-24218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24218"
    },
    {
      "name": "CVE-2025-24097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24097"
    },
    {
      "name": "CVE-2025-30435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30435"
    },
    {
      "name": "CVE-2024-40864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40864"
    },
    {
      "name": "CVE-2025-24157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24157"
    },
    {
      "name": "CVE-2025-24278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24278"
    },
    {
      "name": "CVE-2025-24264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
    },
    {
      "name": "CVE-2025-24172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24172"
    },
    {
      "name": "CVE-2025-30451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30451"
    },
    {
      "name": "CVE-2025-24212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24212"
    },
    {
      "name": "CVE-2025-24252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24252"
    },
    {
      "name": "CVE-2025-24199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24199"
    },
    {
      "name": "CVE-2025-24239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24239"
    },
    {
      "name": "CVE-2025-24139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24139"
    },
    {
      "name": "CVE-2025-24237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24237"
    },
    {
      "name": "CVE-2025-24254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24254"
    },
    {
      "name": "CVE-2025-24226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24226"
    },
    {
      "name": "CVE-2025-24238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24238"
    },
    {
      "name": "CVE-2025-30450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30450"
    },
    {
      "name": "CVE-2025-24192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24192"
    },
    {
      "name": "CVE-2025-24236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24236"
    },
    {
      "name": "CVE-2025-24167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24167"
    },
    {
      "name": "CVE-2025-24232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24232"
    },
    {
      "name": "CVE-2025-31194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31194"
    },
    {
      "name": "CVE-2025-30458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30458"
    },
    {
      "name": "CVE-2025-24261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24261"
    },
    {
      "name": "CVE-2025-30424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30424"
    },
    {
      "name": "CVE-2025-30430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30430"
    },
    {
      "name": "CVE-2025-30444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30444"
    },
    {
      "name": "CVE-2025-24282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24282"
    },
    {
      "name": "CVE-2025-24256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24256"
    },
    {
      "name": "CVE-2025-24259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24259"
    },
    {
      "name": "CVE-2025-24181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24181"
    },
    {
      "name": "CVE-2025-31197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31197"
    },
    {
      "name": "CVE-2025-24233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24233"
    },
    {
      "name": "CVE-2025-24241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24241"
    },
    {
      "name": "CVE-2025-24215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24215"
    },
    {
      "name": "CVE-2025-24214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24214"
    },
    {
      "name": "CVE-2025-30439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30439"
    },
    {
      "name": "CVE-2025-24113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24113"
    },
    {
      "name": "CVE-2025-30460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30460"
    },
    {
      "name": "CVE-2025-30434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30434"
    },
    {
      "name": "CVE-2025-31192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31192"
    },
    {
      "name": "CVE-2025-30428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30428"
    },
    {
      "name": "CVE-2025-24196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24196"
    },
    {
      "name": "CVE-2025-24242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24242"
    },
    {
      "name": "CVE-2025-30438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30438"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2025-30437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30437"
    },
    {
      "name": "CVE-2025-30432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30432"
    },
    {
      "name": "CVE-2024-54533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54533"
    },
    {
      "name": "CVE-2025-24129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24129"
    },
    {
      "name": "CVE-2025-24217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24217"
    },
    {
      "name": "CVE-2025-24272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24272"
    },
    {
      "name": "CVE-2025-24213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213"
    },
    {
      "name": "CVE-2025-24095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24095"
    },
    {
      "name": "CVE-2025-30456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30456"
    },
    {
      "name": "CVE-2025-24209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
    },
    {
      "name": "CVE-2025-24276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24276"
    },
    {
      "name": "CVE-2025-24179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24179"
    },
    {
      "name": "CVE-2025-24208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208"
    },
    {
      "name": "CVE-2025-24190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24190"
    },
    {
      "name": "CVE-2025-30441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30441"
    },
    {
      "name": "CVE-2025-24248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24248"
    },
    {
      "name": "CVE-2025-24243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24243"
    },
    {
      "name": "CVE-2025-31191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31191"
    },
    {
      "name": "CVE-2025-31184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31184"
    },
    {
      "name": "CVE-2025-24245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24245"
    },
    {
      "name": "CVE-2025-30470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30470"
    },
    {
      "name": "CVE-2025-31182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31182"
    },
    {
      "name": "CVE-2025-24251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24251"
    },
    {
      "name": "CVE-2025-24195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24195"
    },
    {
      "name": "CVE-2024-54543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543"
    },
    {
      "name": "CVE-2025-24250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24250"
    },
    {
      "name": "CVE-2025-24234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24234"
    },
    {
      "name": "CVE-2025-24180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24180"
    },
    {
      "name": "CVE-2025-24177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24177"
    },
    {
      "name": "CVE-2025-30454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30454"
    },
    {
      "name": "CVE-2025-30461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30461"
    },
    {
      "name": "CVE-2025-24244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24244"
    },
    {
      "name": "CVE-2025-24230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24230"
    },
    {
      "name": "CVE-2025-24148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24148"
    },
    {
      "name": "CVE-2025-24163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24163"
    },
    {
      "name": "CVE-2025-24231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24231"
    },
    {
      "name": "CVE-2025-24277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24277"
    },
    {
      "name": "CVE-2025-24269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24269"
    },
    {
      "name": "CVE-2024-54534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
    },
    {
      "name": "CVE-2025-24201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201"
    },
    {
      "name": "CVE-2025-31188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31188"
    },
    {
      "name": "CVE-2025-24202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24202"
    },
    {
      "name": "CVE-2025-30446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30446"
    },
    {
      "name": "CVE-2025-30433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30433"
    },
    {
      "name": "CVE-2025-30443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30443"
    },
    {
      "name": "CVE-2025-30426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30426"
    },
    {
      "name": "CVE-2025-30427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
    },
    {
      "name": "CVE-2025-31183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31183"
    }
  ],
  "initial_release_date": "2025-04-01T00:00:00",
  "last_revision_date": "2025-04-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0258",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-01T00:00:00.000000"
    },
    {
      "description": "Ajout de multiples identifiants CVE.",
      "revision_date": "2025-04-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nApple indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24200 et CVE-2025-24201 sont activement exploit\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122378",
      "url": "https://support.apple.com/en-us/122378"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122371",
      "url": "https://support.apple.com/en-us/122371"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122380",
      "url": "https://support.apple.com/en-us/122380"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122379",
      "url": "https://support.apple.com/en-us/122379"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122345",
      "url": "https://support.apple.com/en-us/122345"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122373",
      "url": "https://support.apple.com/en-us/122373"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122372",
      "url": "https://support.apple.com/en-us/122372"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122377",
      "url": "https://support.apple.com/en-us/122377"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122346",
      "url": "https://support.apple.com/en-us/122346"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122374",
      "url": "https://support.apple.com/en-us/122374"
    },
    {
      "published_at": "2025-03-31",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122375",
      "url": "https://support.apple.com/en-us/122375"
    }
  ]
}

CERTFR-2025-AVI-0199
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Apple indique que la vulnérabilité CVE-2025-24201 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple macOS macOS Sequoia versions antérieures à 15.3.2
Apple iPadOS iPadOS versions antérieures à 18.3.2
Apple Safari Safari versions antérieures à 18.3.1
Apple visionOS visionOS versions antérieures à 2.3.2
Apple iOS iOS versions antérieures à 18.3.2
References
Bulletin de sécurité Apple 122284 2025-03-11 vendor-advisory
Bulletin de sécurité Apple 122285 2025-03-11 vendor-advisory
Bulletin de sécurité Apple 122281 2025-03-11 vendor-advisory
Bulletin de sécurité Apple 122283 2025-03-11 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.3.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 18.3.2",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 18.3.1",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 2.3.2",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.3.2",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-24201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201"
    }
  ],
  "initial_release_date": "2025-03-12T00:00:00",
  "last_revision_date": "2025-03-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0199",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Apple. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-24201 est activement exploit\u00e9e.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122284",
      "url": "https://support.apple.com/en-us/122284"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122285",
      "url": "https://support.apple.com/en-us/122285"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122281",
      "url": "https://support.apple.com/en-us/122281"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122283",
      "url": "https://support.apple.com/en-us/122283"
    }
  ]
}

CERTFR-2025-AVI-0110
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits Apple. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Apple indique que la vulnérabilité CVE-2025-24200 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iOS iOS versions antérieures à 18.3.1
Apple iPadOS iPadOS versions antérieures à 17.7.5
Apple iPadOS iPadOS versions antérieures à 18.3.1
References
Bulletin de sécurité Apple 122174 2025-02-09 vendor-advisory
Bulletin de sécurité Apple 122173 2025-02-09 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 18.3.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.5",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS versions ant\u00e9rieures \u00e0 18.3.1",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-24200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24200"
    }
  ],
  "initial_release_date": "2025-02-11T00:00:00",
  "last_revision_date": "2025-02-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0110",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Apple. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-24200 est activement exploit\u00e9e.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2025-02-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122174",
      "url": "https://support.apple.com/en-us/122174"
    },
    {
      "published_at": "2025-02-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 122173",
      "url": "https://support.apple.com/en-us/122173"
    }
  ]
}

CERTFR-2024-AVI-1072
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iOS iOS versions antérieures à 18.2
Apple watchOS watchOS versions antérieures à 11.2
Apple macOS macOS Sonoma versions antérieures à 14.7.2
Apple tvOS tvOS versions antérieures à 18.2
Apple iPadOS iPadOS  versions antérieures à 18.2
Apple iPadOS iPadOS  versions antérieures à 17.7.3
Apple visionOS visionOS versions antérieures à 2.2
Apple macOS macOS Sequoia versions antérieures à 15.2
Apple Safari Safari versions antérieures à 18.2
Apple macOS macOS Ventura versions antérieures à 13.7.2
References
Bulletin de sécurité Apple 121845 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121837 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121840 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121846 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121839 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121838 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121842 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121843 2024-12-11 vendor-advisory
Bulletin de sécurité Apple 121844 2024-12-11 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iOS\u00a0versions ant\u00e9rieures \u00e0 18.2",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS\u00a0versions ant\u00e9rieures \u00e0 11.2",
      "product": {
        "name": "watchOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS\u00a0Sonoma\u00a0versions ant\u00e9rieures \u00e0 14.7.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "tvOS\u00a0versions ant\u00e9rieures \u00e0 18.2",
      "product": {
        "name": "tvOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS\u00a0 versions ant\u00e9rieures \u00e0 18.2",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iPadOS\u00a0 versions ant\u00e9rieures \u00e0 17.7.3",
      "product": {
        "name": "iPadOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS\u00a0versions ant\u00e9rieures \u00e0 2.2",
      "product": {
        "name": "visionOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS\u00a0Sequoia\u00a0versions ant\u00e9rieures \u00e0 15.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 18.2",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS\u00a0Ventura\u00a0versions ant\u00e9rieures \u00e0 13.7.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-54513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54513"
    },
    {
      "name": "CVE-2024-54508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
    },
    {
      "name": "CVE-2024-54502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
    },
    {
      "name": "CVE-2024-54515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54515"
    },
    {
      "name": "CVE-2024-44243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44243"
    },
    {
      "name": "CVE-2024-54505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54505"
    },
    {
      "name": "CVE-2024-54529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54529"
    },
    {
      "name": "CVE-2024-54498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54498"
    },
    {
      "name": "CVE-2024-54479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54479"
    },
    {
      "name": "CVE-2024-44224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44224"
    },
    {
      "name": "CVE-2024-54495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54495"
    },
    {
      "name": "CVE-2024-54514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54514"
    },
    {
      "name": "CVE-2024-54526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54526"
    },
    {
      "name": "CVE-2023-32395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32395"
    },
    {
      "name": "CVE-2024-54477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54477"
    },
    {
      "name": "CVE-2024-54506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54506"
    },
    {
      "name": "CVE-2024-54485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54485"
    },
    {
      "name": "CVE-2024-44225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44225"
    },
    {
      "name": "CVE-2024-54486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54486"
    },
    {
      "name": "CVE-2024-54490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54490"
    },
    {
      "name": "CVE-2024-54489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54489"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2024-54500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54500"
    },
    {
      "name": "CVE-2024-54465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54465"
    },
    {
      "name": "CVE-2024-54484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54484"
    },
    {
      "name": "CVE-2024-44248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44248"
    },
    {
      "name": "CVE-2024-54466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54466"
    },
    {
      "name": "CVE-2024-44246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44246"
    },
    {
      "name": "CVE-2024-54531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54531"
    },
    {
      "name": "CVE-2024-54493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54493"
    },
    {
      "name": "CVE-2024-54494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54494"
    },
    {
      "name": "CVE-2024-54476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54476"
    },
    {
      "name": "CVE-2024-54528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54528"
    },
    {
      "name": "CVE-2024-44220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44220"
    },
    {
      "name": "CVE-2024-54503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54503"
    },
    {
      "name": "CVE-2024-44201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44201"
    },
    {
      "name": "CVE-2024-44300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44300"
    },
    {
      "name": "CVE-2024-54491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54491"
    },
    {
      "name": "CVE-2024-54510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54510"
    },
    {
      "name": "CVE-2024-54504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54504"
    },
    {
      "name": "CVE-2024-54474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54474"
    },
    {
      "name": "CVE-2024-44291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44291"
    },
    {
      "name": "CVE-2024-54534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
    },
    {
      "name": "CVE-2024-54527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54527"
    },
    {
      "name": "CVE-2024-44245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44245"
    },
    {
      "name": "CVE-2024-54524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54524"
    },
    {
      "name": "CVE-2024-54501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54501"
    },
    {
      "name": "CVE-2024-54492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54492"
    }
  ],
  "initial_release_date": "2024-12-12T00:00:00",
  "last_revision_date": "2024-12-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1072",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121845",
      "url": "https://support.apple.com/en-us/121845"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121837",
      "url": "https://support.apple.com/en-us/121837"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121840",
      "url": "https://support.apple.com/en-us/121840"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121846",
      "url": "https://support.apple.com/en-us/121846"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121839",
      "url": "https://support.apple.com/en-us/121839"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121838",
      "url": "https://support.apple.com/en-us/121838"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121842",
      "url": "https://support.apple.com/en-us/121842"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121843",
      "url": "https://support.apple.com/en-us/121843"
    },
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121844",
      "url": "https://support.apple.com/en-us/121844"
    }
  ]
}

CERTFR-2024-AVI-1004
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Apple indique que les vulnérabilités CVE-2024-44308 et CVE-2024-44309 sont activement exploitées.

Impacted products
Vendor Product Description
Apple N/A visionOS versions antérieures à 2.1.1
Apple iOS iOS et iPadOS versions antérieures à 17.7.2
Apple macOS macOS Sequoia versions antérieures à 15.1.1
Apple iOS iOS et iPadOS versions antérieures à 18.1.1
Apple Safari Safari versions antérieures à 18.1.1
References
Bulletin de sécurité Apple 121756 2024-11-19 vendor-advisory
Bulletin de sécurité Apple 121753 2024-11-19 vendor-advisory
Bulletin de sécurité Apple 121755 2024-11-19 vendor-advisory
Bulletin de sécurité Apple 121752 2024-11-19 vendor-advisory
Bulletin de sécurité Apple 121754 2024-11-19 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "visionOS versions ant\u00e9rieures \u00e0 2.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS\u00a0et iPadOS versions ant\u00e9rieures \u00e0 17.7.2",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS\u00a0Sequoia versions ant\u00e9rieures \u00e0 15.1.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS\u00a0et iPadOS versions ant\u00e9rieures \u00e0 18.1.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari\u00a0versions ant\u00e9rieures \u00e0 18.1.1",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "Apple indique que les vuln\u00e9rabilit\u00e9s CVE-2024-44308 et CVE-2024-44309 sont activement exploit\u00e9es.",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-44309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44309"
    },
    {
      "name": "CVE-2024-44308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44308"
    }
  ],
  "initial_release_date": "2024-11-20T00:00:00",
  "last_revision_date": "2024-11-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1004",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121756",
      "url": "https://support.apple.com/en-us/121756"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121753",
      "url": "https://support.apple.com/en-us/121753"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121755",
      "url": "https://support.apple.com/en-us/121755"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121752",
      "url": "https://support.apple.com/en-us/121752"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121754",
      "url": "https://support.apple.com/en-us/121754"
    }
  ]
}

CERTFR-2024-AVI-0929
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple N/A tvOS 18.1 versions antérieures à 18.1
Apple iOS iOS et iPadOS versions antérieures à 18.1
Apple iOS iOS et iPadOS versions antérieures à 17.7.1
Apple macOS macOS Sequoia versions antérieures à 15.1
Apple macOS macOS Sonoma versions antérieures à 14.7.1
Apple N/A watchOS 11.1 versions antérieures à 11.1
Apple macOS macOS Ventura versions antérieures à 13.7.1
Apple N/A visionOS 2.1 versions antérieures à 2.1
References
Bulletin de sécurité Apple 121566 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121568 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121565 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121564 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121563 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121569 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121567 2024-10-28 vendor-advisory
Bulletin de sécurité Apple 121570 2024-10-28 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "tvOS\u00a018.1 versions ant\u00e9rieures \u00e0 18.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 18.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 17.7.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS\u00a011.1 versions ant\u00e9rieures \u00e0 11.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS\u00a02.1 versions ant\u00e9rieures \u00e0 2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-44194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44194"
    },
    {
      "name": "CVE-2024-44296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296"
    },
    {
      "name": "CVE-2024-44257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44257"
    },
    {
      "name": "CVE-2024-44289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44289"
    },
    {
      "name": "CVE-2024-44155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44155"
    },
    {
      "name": "CVE-2024-44280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44280"
    },
    {
      "name": "CVE-2024-44254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44254"
    },
    {
      "name": "CVE-2024-44256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44256"
    },
    {
      "name": "CVE-2024-44235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44235"
    },
    {
      "name": "CVE-2024-44195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44195"
    },
    {
      "name": "CVE-2024-44281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44281"
    },
    {
      "name": "CVE-2024-44251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44251"
    },
    {
      "name": "CVE-2024-44287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44287"
    },
    {
      "name": "CVE-2024-44284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44284"
    },
    {
      "name": "CVE-2024-44277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44277"
    },
    {
      "name": "CVE-2024-44237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44237"
    },
    {
      "name": "CVE-2024-44261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44261"
    },
    {
      "name": "CVE-2024-44213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44213"
    },
    {
      "name": "CVE-2024-44293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44293"
    },
    {
      "name": "CVE-2024-44223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44223"
    },
    {
      "name": "CVE-2024-44295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44295"
    },
    {
      "name": "CVE-2024-44270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44270"
    },
    {
      "name": "CVE-2024-44215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44215"
    },
    {
      "name": "CVE-2024-44244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
    },
    {
      "name": "CVE-2024-44275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44275"
    },
    {
      "name": "CVE-2024-44156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44156"
    },
    {
      "name": "CVE-2024-44255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44255"
    },
    {
      "name": "CVE-2024-44247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44247"
    },
    {
      "name": "CVE-2024-44159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44159"
    },
    {
      "name": "CVE-2024-44175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44175"
    },
    {
      "name": "CVE-2024-44218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44218"
    },
    {
      "name": "CVE-2024-44252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44252"
    },
    {
      "name": "CVE-2024-44197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44197"
    },
    {
      "name": "CVE-2024-44264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44264"
    },
    {
      "name": "CVE-2024-44259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44259"
    },
    {
      "name": "CVE-2024-44216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44216"
    },
    {
      "name": "CVE-2024-40851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40851"
    },
    {
      "name": "CVE-2024-44302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44302"
    },
    {
      "name": "CVE-2024-40855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40855"
    },
    {
      "name": "CVE-2024-38476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476"
    },
    {
      "name": "CVE-2024-44267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44267"
    },
    {
      "name": "CVE-2024-44258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44258"
    },
    {
      "name": "CVE-2024-44196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44196"
    },
    {
      "name": "CVE-2024-44273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44273"
    },
    {
      "name": "CVE-2024-44122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44122"
    },
    {
      "name": "CVE-2024-44126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44126"
    },
    {
      "name": "CVE-2024-44278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44278"
    },
    {
      "name": "CVE-2024-38477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477"
    },
    {
      "name": "CVE-2024-44292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44292"
    },
    {
      "name": "CVE-2024-44239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44239"
    },
    {
      "name": "CVE-2024-40867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40867"
    },
    {
      "name": "CVE-2024-44137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44137"
    },
    {
      "name": "CVE-2024-44279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44279"
    },
    {
      "name": "CVE-2024-44263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44263"
    },
    {
      "name": "CVE-2024-44231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44231"
    },
    {
      "name": "CVE-2024-40858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40858"
    },
    {
      "name": "CVE-2024-44269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44269"
    },
    {
      "name": "CVE-2024-44260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44260"
    },
    {
      "name": "CVE-2024-44298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44298"
    },
    {
      "name": "CVE-2024-44236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44236"
    },
    {
      "name": "CVE-2024-44274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44274"
    },
    {
      "name": "CVE-2024-44283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44283"
    },
    {
      "name": "CVE-2024-44253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44253"
    },
    {
      "name": "CVE-2024-44285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44285"
    },
    {
      "name": "CVE-2024-44301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44301"
    },
    {
      "name": "CVE-2024-44265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44265"
    },
    {
      "name": "CVE-2024-44144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44144"
    },
    {
      "name": "CVE-2024-44297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44297"
    },
    {
      "name": "CVE-2024-44262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44262"
    },
    {
      "name": "CVE-2024-44222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44222"
    },
    {
      "name": "CVE-2024-44294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44294"
    },
    {
      "name": "CVE-2024-39573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573"
    },
    {
      "name": "CVE-2024-44282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44282"
    },
    {
      "name": "CVE-2024-44240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44240"
    },
    {
      "name": "CVE-2024-44211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44211"
    },
    {
      "name": "CVE-2024-44229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44229"
    }
  ],
  "initial_release_date": "2024-10-29T00:00:00",
  "last_revision_date": "2024-10-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0929",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121566",
      "url": "https://support.apple.com/en-us/121566"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121568",
      "url": "https://support.apple.com/en-us/121568"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121565",
      "url": "https://support.apple.com/en-us/121565"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121564",
      "url": "https://support.apple.com/en-us/121564"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121563",
      "url": "https://support.apple.com/en-us/121563"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121569",
      "url": "https://support.apple.com/en-us/121569"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121567",
      "url": "https://support.apple.com/en-us/121567"
    },
    {
      "published_at": "2024-10-28",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121570",
      "url": "https://support.apple.com/en-us/121570"
    }
  ]
}

CERTFR-2024-AVI-0835
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple iOS iOS et iPadOS versions antérieures à 18.0.1
References
Bulletin de sécurité Apple 121373 2024-10-03 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 18.0.1",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-44204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44204"
    },
    {
      "name": "CVE-2024-44207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44207"
    }
  ],
  "initial_release_date": "2024-10-04T00:00:00",
  "last_revision_date": "2024-10-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0835",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2024-10-03",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121373",
      "url": "https://support.apple.com/en-us/121373"
    }
  ]
}

CERTFR-2024-AVI-0785
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Apple N/A tvOS versions antérieures à 18
Apple N/A visionOS versions antérieures à 2
Apple iOS iOS et iPadOS versions antérieures à 18
Apple iOS iOS et iPadOS versions antérieures à 17.7
Apple N/A Xcode versions antérieures à 16
Apple macOS macOS Sonoma versions antérieures à 14.7
Apple macOS macOS Sequoia versions antérieures à 15
Apple macOS macOS Ventura versions antérieures à 13.7
Apple Safari Safari versions antérieures à 18
Apple N/A watchOS 11 versions antérieures à 11
References
Bulletin de sécurité Apple 121238 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121240 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121239 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121246 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121241 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121250 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121234 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121247 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121249 2024-09-16 vendor-advisory
Bulletin de sécurité Apple 121248 2024-09-16 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 18",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "visionOS\u00a0versions ant\u00e9rieures \u00e0 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 18",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 17.7",
      "product": {
        "name": "iOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Xcode versions ant\u00e9rieures \u00e0 16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 18",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS\u00a011 versions ant\u00e9rieures \u00e0 11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-44124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44124"
    },
    {
      "name": "CVE-2024-44135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44135"
    },
    {
      "name": "CVE-2024-40837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40837"
    },
    {
      "name": "CVE-2023-5841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
    },
    {
      "name": "CVE-2023-4504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
    },
    {
      "name": "CVE-2024-44191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44191"
    },
    {
      "name": "CVE-2024-40856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40856"
    },
    {
      "name": "CVE-2024-44146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44146"
    },
    {
      "name": "CVE-2024-44181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44181"
    },
    {
      "name": "CVE-2024-40863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40863"
    },
    {
      "name": "CVE-2024-23237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23237"
    },
    {
      "name": "CVE-2024-27879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27879"
    },
    {
      "name": "CVE-2024-44183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44183"
    },
    {
      "name": "CVE-2024-40866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
    },
    {
      "name": "CVE-2024-44184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44184"
    },
    {
      "name": "CVE-2024-40857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40857"
    },
    {
      "name": "CVE-2024-40842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40842"
    },
    {
      "name": "CVE-2024-44131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44131"
    },
    {
      "name": "CVE-2024-44178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44178"
    },
    {
      "name": "CVE-2024-44169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44169"
    },
    {
      "name": "CVE-2024-44202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44202"
    },
    {
      "name": "CVE-2024-41957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
    },
    {
      "name": "CVE-2024-44167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44167"
    },
    {
      "name": "CVE-2024-40844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40844"
    },
    {
      "name": "CVE-2024-27869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27869"
    },
    {
      "name": "CVE-2024-40791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40791"
    },
    {
      "name": "CVE-2024-44189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44189"
    },
    {
      "name": "CVE-2024-44187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
    },
    {
      "name": "CVE-2024-44158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44158"
    },
    {
      "name": "CVE-2024-44171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44171"
    },
    {
      "name": "CVE-2024-44177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44177"
    },
    {
      "name": "CVE-2024-44170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44170"
    },
    {
      "name": "CVE-2024-40825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40825"
    },
    {
      "name": "CVE-2024-40826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40826"
    },
    {
      "name": "CVE-2024-27880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27880"
    },
    {
      "name": "CVE-2024-44188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44188"
    },
    {
      "name": "CVE-2024-40797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40797"
    },
    {
      "name": "CVE-2024-44130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44130"
    },
    {
      "name": "CVE-2024-44132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44132"
    },
    {
      "name": "CVE-2024-39894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39894"
    },
    {
      "name": "CVE-2024-44161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44161"
    },
    {
      "name": "CVE-2024-40847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40847"
    },
    {
      "name": "CVE-2024-40838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40838"
    },
    {
      "name": "CVE-2024-44164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44164"
    },
    {
      "name": "CVE-2024-44186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44186"
    },
    {
      "name": "CVE-2024-44148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44148"
    },
    {
      "name": "CVE-2024-44190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44190"
    },
    {
      "name": "CVE-2024-44133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44133"
    },
    {
      "name": "CVE-2024-27886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27886"
    },
    {
      "name": "CVE-2024-40831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40831"
    },
    {
      "name": "CVE-2024-40845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40845"
    },
    {
      "name": "CVE-2024-40860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40860"
    },
    {
      "name": "CVE-2024-44180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44180"
    },
    {
      "name": "CVE-2024-40848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40848"
    },
    {
      "name": "CVE-2024-44147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44147"
    },
    {
      "name": "CVE-2024-44152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44152"
    },
    {
      "name": "CVE-2024-40843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40843"
    },
    {
      "name": "CVE-2024-44198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44198"
    },
    {
      "name": "CVE-2024-40770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40770"
    },
    {
      "name": "CVE-2024-44139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44139"
    },
    {
      "name": "CVE-2024-44151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44151"
    },
    {
      "name": "CVE-2024-44165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44165"
    },
    {
      "name": "CVE-2024-40850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40850"
    },
    {
      "name": "CVE-2024-44182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44182"
    },
    {
      "name": "CVE-2024-27875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27875"
    },
    {
      "name": "CVE-2024-44149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44149"
    },
    {
      "name": "CVE-2024-27858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27858"
    },
    {
      "name": "CVE-2024-44154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44154"
    },
    {
      "name": "CVE-2024-40840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40840"
    },
    {
      "name": "CVE-2024-27874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27874"
    },
    {
      "name": "CVE-2024-40841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40841"
    },
    {
      "name": "CVE-2024-27876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27876"
    },
    {
      "name": "CVE-2024-40859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40859"
    },
    {
      "name": "CVE-2024-44153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44153"
    },
    {
      "name": "CVE-2024-40846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40846"
    },
    {
      "name": "CVE-2024-40814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40814"
    },
    {
      "name": "CVE-2024-40852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40852"
    },
    {
      "name": "CVE-2024-27795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27795"
    },
    {
      "name": "CVE-2024-40861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40861"
    },
    {
      "name": "CVE-2024-40862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40862"
    },
    {
      "name": "CVE-2024-44128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44128"
    },
    {
      "name": "CVE-2024-44176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44176"
    },
    {
      "name": "CVE-2024-44162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44162"
    },
    {
      "name": "CVE-2024-40830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40830"
    },
    {
      "name": "CVE-2024-40801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40801"
    },
    {
      "name": "CVE-2024-44163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44163"
    },
    {
      "name": "CVE-2024-44129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44129"
    },
    {
      "name": "CVE-2024-27860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27860"
    },
    {
      "name": "CVE-2024-44166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44166"
    },
    {
      "name": "CVE-2024-44168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44168"
    },
    {
      "name": "CVE-2024-44134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44134"
    },
    {
      "name": "CVE-2024-44125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44125"
    },
    {
      "name": "CVE-2024-27861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27861"
    },
    {
      "name": "CVE-2024-44127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44127"
    },
    {
      "name": "CVE-2024-40790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40790"
    },
    {
      "name": "CVE-2024-44160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44160"
    }
  ],
  "initial_release_date": "2024-09-17T00:00:00",
  "last_revision_date": "2024-09-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0785",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121238",
      "url": "https://support.apple.com/en-us/121238"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121240",
      "url": "https://support.apple.com/en-us/121240"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121239",
      "url": "https://support.apple.com/en-us/121239"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121246",
      "url": "https://support.apple.com/en-us/121246"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121241",
      "url": "https://support.apple.com/en-us/121241"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121250",
      "url": "https://support.apple.com/en-us/121250"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121234",
      "url": "https://support.apple.com/en-us/121234"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121247",
      "url": "https://support.apple.com/en-us/121247"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121249",
      "url": "https://support.apple.com/en-us/121249"
    },
    {
      "published_at": "2024-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Apple 121248",
      "url": "https://support.apple.com/en-us/121248"
    }
  ]
}

CVE-2022-32917 (GCVE-0-2022-32917)
Vulnerability from nvd
Published
2022-09-20 00:00
Modified
2025-10-21 23:15
CWE
  • An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
Summary
The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 16
Create a notification for this product.
   Apple macOS Version: unspecified   < 11.7
Create a notification for this product.
   Apple macOS Version: unspecified   < 15.7
Create a notification for this product.
   Apple macOS Version: unspecified   < 12.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T07:54:02.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213446"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213443"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213445"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213444"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/39"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-4 Additional information for APPLE-SA-2022-09-12-2 iOS 15.7 and iPadOS 15.7",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/40"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/43"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/45"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-32917",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T15:09:49.503601Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-09-14",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-32917"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:15:35.105Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-32917"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2022-09-14T00:00:00+00:00",
            "value": "CVE-2022-32917 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "16",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "11.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "15.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-30T00:00:00.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "url": "https://support.apple.com/en-us/HT213446"
        },
        {
          "url": "https://support.apple.com/en-us/HT213443"
        },
        {
          "url": "https://support.apple.com/en-us/HT213445"
        },
        {
          "url": "https://support.apple.com/en-us/HT213444"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/39"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-4 Additional information for APPLE-SA-2022-09-12-2 iOS 15.7 and iPadOS 15.7",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/40"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/43"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/45"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2022-32917",
    "datePublished": "2022-09-20T00:00:00.000Z",
    "dateReserved": "2022-06-09T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:15:35.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30666 (GCVE-0-2021-30666)
Vulnerability from nvd
Published
2021-09-08 14:25
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
References
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:40:31.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212341"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30666",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:25:57.064117Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30666"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:34.810Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30666"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30666 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution.\u00a0Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-08T14:25:25.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212341"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30666",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution.\u00a0Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212341",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212341"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30666",
    "datePublished": "2021-09-08T14:25:25.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:34.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30762 (GCVE-0-2021-30762)
Vulnerability from nvd
Published
2021-09-08 13:46
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
References
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:40:32.170Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212548"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30762",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:27:21.674927Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30762"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:35.091Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30762"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30762 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-08T13:46:40.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30762",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212548",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30762",
    "datePublished": "2021-09-08T13:46:40.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:35.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30761 (GCVE-0-2021-30761)
Vulnerability from nvd
Published
2021-09-08 13:45
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
References
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:40:32.149Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212548"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30761",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:27:48.411136Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30761"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:35.227Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30761"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30761 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-08T13:45:58.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30761",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212548",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30761",
    "datePublished": "2021-09-08T13:45:58.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:35.227Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30860 (GCVE-0-2021-30860)
Vulnerability from nvd
Published
2021-08-24 18:49
Modified
2025-10-21 23:25
CWE
  • Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
https://support.apple.com/en-us/HT212804 x_refsource_MISC
https://support.apple.com/en-us/HT212805 x_refsource_MISC
https://support.apple.com/en-us/HT212807 x_refsource_MISC
https://support.apple.com/en-us/HT212806 x_refsource_MISC
http://seclists.org/fulldisclosure/2021/Sep/28 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/27 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/25 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/26 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/40 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/38 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/39 mailing-list, x_refsource_FULLDISC
https://support.apple.com/kb/HT212824 x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2021/Sep/50 mailing-list, x_refsource_FULLDISC
http://www.openwall.com/lists/oss-security/2022/09/02/11 mailing-list, x_refsource_MLIST
https://security.gentoo.org/glsa/202209-21 vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
Apple macOS Version: unspecified   < 11.6
Create a notification for this product.
   Apple macOS Version: unspecified   < 2021-005
Create a notification for this product.
   Apple watchOS Version: unspecified   < 7.6
Create a notification for this product.
   Apple iOS Version: unspecified   < 14.8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:48:13.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212804"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212805"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212807"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212806"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/28"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/26"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT212824"
          },
          {
            "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
          },
          {
            "name": "[oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11"
          },
          {
            "name": "GLSA-202209-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-21"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30860",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-05T18:40:44.536500Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30860"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-190",
                "description": "CWE-190 Integer Overflow or Wraparound",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:37.148Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30860"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30860 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "11.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "2021-005",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "watchOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "7.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "14.8",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-29T16:07:49.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212804"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212805"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212807"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212806"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/28"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/26"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/kb/HT212824"
        },
        {
          "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
        },
        {
          "name": "[oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11"
        },
        {
          "name": "GLSA-202209-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202209-21"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30860",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "macOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "11.6"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "macOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "2021-005"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "watchOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.6"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "14.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212804",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212804"
            },
            {
              "name": "https://support.apple.com/en-us/HT212805",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212805"
            },
            {
              "name": "https://support.apple.com/en-us/HT212807",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212807"
            },
            {
              "name": "https://support.apple.com/en-us/HT212806",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212806"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/28"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/26"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
            },
            {
              "name": "https://support.apple.com/kb/HT212824",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/kb/HT212824"
            },
            {
              "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
            },
            {
              "name": "[oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11"
            },
            {
              "name": "GLSA-202209-21",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202209-21"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30860",
    "datePublished": "2021-08-24T18:49:25.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:37.148Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30858 (GCVE-0-2021-30858)
Vulnerability from nvd
Published
2021-08-24 18:49
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
https://support.apple.com/en-us/HT212804 x_refsource_MISC
https://support.apple.com/en-us/HT212807 x_refsource_MISC
http://seclists.org/fulldisclosure/2021/Sep/27 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/25 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/29 mailing-list, x_refsource_FULLDISC
http://www.openwall.com/lists/oss-security/2021/09/20/1 mailing-list, x_refsource_MLIST
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/ vendor-advisory, x_refsource_FEDORA
http://seclists.org/fulldisclosure/2021/Sep/38 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/39 mailing-list, x_refsource_FULLDISC
https://www.debian.org/security/2021/dsa-4975 vendor-advisory, x_refsource_DEBIAN
https://www.debian.org/security/2021/dsa-4976 vendor-advisory, x_refsource_DEBIAN
https://support.apple.com/kb/HT212824 x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2021/Sep/50 mailing-list, x_refsource_FULLDISC
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/ vendor-advisory, x_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2021/10/26/9 mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/10/27/1 mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/10/27/2 mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/10/27/4 mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Apple macOS Version: unspecified   < 11.6
Create a notification for this product.
   Apple iOS Version: unspecified   < 14.8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:48:13.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212804"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212807"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/29"
          },
          {
            "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
          },
          {
            "name": "FEDORA-2021-c00e45b6c0",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
          },
          {
            "name": "DSA-4975",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4975"
          },
          {
            "name": "DSA-4976",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4976"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT212824"
          },
          {
            "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
          },
          {
            "name": "FEDORA-2021-edf6957b7d",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"
          },
          {
            "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
          },
          {
            "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
          },
          {
            "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
          },
          {
            "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30858",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:31:17.221055Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30858"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:37.307Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30858"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30858 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "11.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "14.8",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-27T20:06:21.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212804"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212807"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/29"
        },
        {
          "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
        },
        {
          "name": "FEDORA-2021-c00e45b6c0",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
        },
        {
          "name": "DSA-4975",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4975"
        },
        {
          "name": "DSA-4976",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4976"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/kb/HT212824"
        },
        {
          "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
        },
        {
          "name": "FEDORA-2021-edf6957b7d",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"
        },
        {
          "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
        },
        {
          "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
        },
        {
          "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
        },
        {
          "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30858",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "macOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "11.6"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "14.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212804",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212804"
            },
            {
              "name": "https://support.apple.com/en-us/HT212807",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212807"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/29"
            },
            {
              "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
            },
            {
              "name": "FEDORA-2021-c00e45b6c0",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
            },
            {
              "name": "DSA-4975",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4975"
            },
            {
              "name": "DSA-4976",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4976"
            },
            {
              "name": "https://support.apple.com/kb/HT212824",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/kb/HT212824"
            },
            {
              "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
            },
            {
              "name": "FEDORA-2021-edf6957b7d",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"
            },
            {
              "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
            },
            {
              "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
            },
            {
              "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
            },
            {
              "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30858",
    "datePublished": "2021-08-24T18:49:23.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:37.307Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1879 (GCVE-0-2021-1879)
Vulnerability from nvd
Published
2021-04-02 18:07
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.
Summary
This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited..
Impacted products
Vendor Product Version
Apple iOS and iPadOS Version: unspecified   < 14.4
Create a notification for this product.
   Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
   Apple watchOS Version: unspecified   < 7.3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:25:06.324Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212256"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212257"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212258"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-1879",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:31:41.503370Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-1879"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:49.688Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-1879"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-1879 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS and iPadOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "14.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "watchOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "7.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-02T18:07:52.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212256"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212257"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212258"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-1879",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS and iPadOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "14.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "watchOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212256",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212256"
            },
            {
              "name": "https://support.apple.com/en-us/HT212257",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212257"
            },
            {
              "name": "https://support.apple.com/en-us/HT212258",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212258"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-1879",
    "datePublished": "2021-04-02T18:07:52.000Z",
    "dateReserved": "2020-12-08T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:49.688Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-32917 (GCVE-0-2022-32917)
Vulnerability from cvelistv5
Published
2022-09-20 00:00
Modified
2025-10-21 23:15
CWE
  • An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
Summary
The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 16
Create a notification for this product.
   Apple macOS Version: unspecified   < 11.7
Create a notification for this product.
   Apple macOS Version: unspecified   < 15.7
Create a notification for this product.
   Apple macOS Version: unspecified   < 12.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T07:54:02.968Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213446"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213443"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213445"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213444"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/39"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-4 Additional information for APPLE-SA-2022-09-12-2 iOS 15.7 and iPadOS 15.7",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/40"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/43"
          },
          {
            "name": "20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Oct/45"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-32917",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T15:09:49.503601Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-09-14",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-32917"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:15:35.105Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-32917"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2022-09-14T00:00:00+00:00",
            "value": "CVE-2022-32917 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "16",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "11.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "15.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-30T00:00:00.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "url": "https://support.apple.com/en-us/HT213446"
        },
        {
          "url": "https://support.apple.com/en-us/HT213443"
        },
        {
          "url": "https://support.apple.com/en-us/HT213445"
        },
        {
          "url": "https://support.apple.com/en-us/HT213444"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/39"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-4 Additional information for APPLE-SA-2022-09-12-2 iOS 15.7 and iPadOS 15.7",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/40"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/43"
        },
        {
          "name": "20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7",
          "tags": [
            "mailing-list"
          ],
          "url": "http://seclists.org/fulldisclosure/2022/Oct/45"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2022-32917",
    "datePublished": "2022-09-20T00:00:00.000Z",
    "dateReserved": "2022-06-09T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:15:35.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30666 (GCVE-0-2021-30666)
Vulnerability from cvelistv5
Published
2021-09-08 14:25
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
References
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:40:31.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212341"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30666",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:25:57.064117Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30666"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:34.810Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30666"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30666 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution.\u00a0Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-08T14:25:25.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212341"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30666",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution.\u00a0Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212341",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212341"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30666",
    "datePublished": "2021-09-08T14:25:25.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:34.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30762 (GCVE-0-2021-30762)
Vulnerability from cvelistv5
Published
2021-09-08 13:46
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
References
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:40:32.170Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212548"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30762",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:27:21.674927Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30762"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:35.091Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30762"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30762 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-08T13:46:40.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30762",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212548",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30762",
    "datePublished": "2021-09-08T13:46:40.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:35.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30761 (GCVE-0-2021-30761)
Vulnerability from cvelistv5
Published
2021-09-08 13:45
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
References
Impacted products
Vendor Product Version
Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:40:32.149Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212548"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30761",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:27:48.411136Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30761"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:35.227Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30761"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30761 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-08T13:45:58.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30761",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212548",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30761",
    "datePublished": "2021-09-08T13:45:58.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:35.227Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30860 (GCVE-0-2021-30860)
Vulnerability from cvelistv5
Published
2021-08-24 18:49
Modified
2025-10-21 23:25
CWE
  • Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
https://support.apple.com/en-us/HT212804 x_refsource_MISC
https://support.apple.com/en-us/HT212805 x_refsource_MISC
https://support.apple.com/en-us/HT212807 x_refsource_MISC
https://support.apple.com/en-us/HT212806 x_refsource_MISC
http://seclists.org/fulldisclosure/2021/Sep/28 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/27 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/25 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/26 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/40 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/38 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/39 mailing-list, x_refsource_FULLDISC
https://support.apple.com/kb/HT212824 x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2021/Sep/50 mailing-list, x_refsource_FULLDISC
http://www.openwall.com/lists/oss-security/2022/09/02/11 mailing-list, x_refsource_MLIST
https://security.gentoo.org/glsa/202209-21 vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
Apple macOS Version: unspecified   < 11.6
Create a notification for this product.
   Apple macOS Version: unspecified   < 2021-005
Create a notification for this product.
   Apple watchOS Version: unspecified   < 7.6
Create a notification for this product.
   Apple iOS Version: unspecified   < 14.8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:48:13.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212804"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212805"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212807"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212806"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/28"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/26"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT212824"
          },
          {
            "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
          },
          {
            "name": "[oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11"
          },
          {
            "name": "GLSA-202209-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-21"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30860",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-05T18:40:44.536500Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30860"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-190",
                "description": "CWE-190 Integer Overflow or Wraparound",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:37.148Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30860"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30860 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "11.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "2021-005",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "watchOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "7.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "14.8",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-29T16:07:49.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212804"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212805"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212807"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212806"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/28"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/26"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/kb/HT212824"
        },
        {
          "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
        },
        {
          "name": "[oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11"
        },
        {
          "name": "GLSA-202209-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202209-21"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30860",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "macOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "11.6"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "macOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "2021-005"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "watchOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.6"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "14.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212804",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212804"
            },
            {
              "name": "https://support.apple.com/en-us/HT212805",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212805"
            },
            {
              "name": "https://support.apple.com/en-us/HT212807",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212807"
            },
            {
              "name": "https://support.apple.com/en-us/HT212806",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212806"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/28"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/26"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
            },
            {
              "name": "https://support.apple.com/kb/HT212824",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/kb/HT212824"
            },
            {
              "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
            },
            {
              "name": "[oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11"
            },
            {
              "name": "GLSA-202209-21",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202209-21"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30860",
    "datePublished": "2021-08-24T18:49:25.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:37.148Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-30858 (GCVE-0-2021-30858)
Vulnerability from cvelistv5
Published
2021-08-24 18:49
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Summary
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
https://support.apple.com/en-us/HT212804 x_refsource_MISC
https://support.apple.com/en-us/HT212807 x_refsource_MISC
http://seclists.org/fulldisclosure/2021/Sep/27 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/25 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/29 mailing-list, x_refsource_FULLDISC
http://www.openwall.com/lists/oss-security/2021/09/20/1 mailing-list, x_refsource_MLIST
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/ vendor-advisory, x_refsource_FEDORA
http://seclists.org/fulldisclosure/2021/Sep/38 mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2021/Sep/39 mailing-list, x_refsource_FULLDISC
https://www.debian.org/security/2021/dsa-4975 vendor-advisory, x_refsource_DEBIAN
https://www.debian.org/security/2021/dsa-4976 vendor-advisory, x_refsource_DEBIAN
https://support.apple.com/kb/HT212824 x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2021/Sep/50 mailing-list, x_refsource_FULLDISC
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/ vendor-advisory, x_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2021/10/26/9 mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/10/27/1 mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/10/27/2 mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/10/27/4 mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Apple macOS Version: unspecified   < 11.6
Create a notification for this product.
   Apple iOS Version: unspecified   < 14.8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:48:13.458Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212804"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212807"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
          },
          {
            "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/29"
          },
          {
            "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
          },
          {
            "name": "FEDORA-2021-c00e45b6c0",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
          },
          {
            "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
          },
          {
            "name": "DSA-4975",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4975"
          },
          {
            "name": "DSA-4976",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4976"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT212824"
          },
          {
            "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
          },
          {
            "name": "FEDORA-2021-edf6957b7d",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"
          },
          {
            "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
          },
          {
            "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
          },
          {
            "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
          },
          {
            "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-30858",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:31:17.221055Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30858"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-416",
                "description": "CWE-416 Use After Free",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:37.307Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30858"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-30858 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "11.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "14.8",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-27T20:06:21.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212804"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212807"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
        },
        {
          "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/29"
        },
        {
          "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
        },
        {
          "name": "FEDORA-2021-c00e45b6c0",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
        },
        {
          "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
        },
        {
          "name": "DSA-4975",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4975"
        },
        {
          "name": "DSA-4976",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4976"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/kb/HT212824"
        },
        {
          "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
        },
        {
          "name": "FEDORA-2021-edf6957b7d",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"
        },
        {
          "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
        },
        {
          "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
        },
        {
          "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
        },
        {
          "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-30858",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "macOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "11.6"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "14.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212804",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212804"
            },
            {
              "name": "https://support.apple.com/en-us/HT212807",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212807"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/27"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/25"
            },
            {
              "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/29"
            },
            {
              "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
            },
            {
              "name": "FEDORA-2021-c00e45b6c0",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/38"
            },
            {
              "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
            },
            {
              "name": "DSA-4975",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4975"
            },
            {
              "name": "DSA-4976",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4976"
            },
            {
              "name": "https://support.apple.com/kb/HT212824",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/kb/HT212824"
            },
            {
              "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2021/Sep/50"
            },
            {
              "name": "FEDORA-2021-edf6957b7d",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"
            },
            {
              "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
            },
            {
              "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
            },
            {
              "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
            },
            {
              "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-30858",
    "datePublished": "2021-08-24T18:49:23.000Z",
    "dateReserved": "2021-04-13T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:37.307Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-1879 (GCVE-0-2021-1879)
Vulnerability from cvelistv5
Published
2021-04-02 18:07
Modified
2025-10-21 23:25
CWE
  • Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.
Summary
This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited..
Impacted products
Vendor Product Version
Apple iOS and iPadOS Version: unspecified   < 14.4
Create a notification for this product.
   Apple iOS Version: unspecified   < 12.5
Create a notification for this product.
   Apple watchOS Version: unspecified   < 7.3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T16:25:06.324Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212256"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212257"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT212258"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-1879",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-29T17:31:41.503370Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2021-11-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-1879"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:25:49.688Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-1879"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2021-11-03T00:00:00+00:00",
            "value": "CVE-2021-1879 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iOS and iPadOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "14.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "iOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "watchOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "7.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-02T18:07:52.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212256"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212257"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.apple.com/en-us/HT212258"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2021-1879",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iOS and iPadOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "14.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "iOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "12.5"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "watchOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apple"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT212256",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212256"
            },
            {
              "name": "https://support.apple.com/en-us/HT212257",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212257"
            },
            {
              "name": "https://support.apple.com/en-us/HT212258",
              "refsource": "MISC",
              "url": "https://support.apple.com/en-us/HT212258"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2021-1879",
    "datePublished": "2021-04-02T18:07:52.000Z",
    "dateReserved": "2020-12-08T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:25:49.688Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}