First published: Mon Apr 26 2021(Updated: )
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. A local user may be able to modify protected parts of the file system.
Credit: Zhipeng Huo @R3dF09 Yuebin Sun @yuebinsun2020 Tencent Security Xuanwu LabZhipeng Huo @R3dF09 Tencent Security Xuanwu Lab product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.3 | 11.3 |
tvOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <14.5 | |
iOS | <14.5 | |
Apple iOS and macOS | >=11.0<11.3 | |
tvOS | <14.5 | |
Apple iOS, iPadOS, and watchOS | <7.4 | |
Apple iOS, iPadOS, and watchOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <7.4 | 7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-1815 is a vulnerability in Apple software that relates to a parsing issue in the handling of directory paths.
Apple iOS, iPadOS, watchOS, macOS Big Sur, and tvOS versions up to and including 14.5, 7.4, 11.3, 14.5, and 14.5 respectively are affected.
The severity of CVE-2021-1815 is not mentioned in the provided information.
To fix CVE-2021-1815, update your Apple software to the recommended versions mentioned in the provided references.
You can find more information about CVE-2021-1815 in the provided references: [Link 1](https://support.apple.com/en-us/HT212317), [Link 2](https://support.apple.com/en-us/HT212324), [Link 3](https://support.apple.com/en-us/HT212325)