First published: Mon Apr 26 2021(Updated: )
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.
Credit: an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <14.5 | 14.5 |
Apple iPadOS | <14.5 | 14.5 |
Apple tvOS | <14.5 | 14.5 |
<7.4 | 7.4 | |
Apple macOS Big Sur | <11.3 | 11.3 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
Apple iPadOS | <14.5 | |
Apple iPhone OS | <14.5 | |
Apple macOS | >=11.0<11.3 | |
Apple tvOS | <14.5 | |
Apple watchOS | <7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2021-1826.
The affected software includes Apple iOS 14.5, Apple iPadOS 14.5, Apple watchOS 7.4, Apple macOS Big Sur 11.3, and Apple tvOS 14.5.
The severity of CVE-2021-1826 is not specified.
CVE-2021-1826 is a logic issue that was addressed with improved restrictions in WebKit.
To fix CVE-2021-1826, update your affected software to the specified versions provided by Apple.