First published: Mon Apr 26 2021(Updated: )
An issue in code signature validation was addressed with improved checks. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. A malicious application may be able to bypass Privacy preferences.
Credit: Siguza product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.3 | 11.3 |
tvOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <14.5 | |
iOS | <14.5 | |
Apple iOS and macOS | >=11.0<11.3 | |
tvOS | <14.5 | |
Apple iOS, iPadOS, and watchOS | <7.4 | |
Apple iOS, iPadOS, and watchOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <7.4 | 7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-1849.
The title of this vulnerability is 'AppleMobileFileIntegrity. An issue in code signature validation was addressed with improved checks.'
The affected software versions are Apple iOS up to exclusive version 14.5, Apple iPadOS up to exclusive version 14.5, Apple watchOS up to exclusive version 7.4, Apple macOS Big Sur up to exclusive version 11.3, and Apple tvOS up to exclusive version 14.5.
This vulnerability was addressed with improved checks in code signature validation.
Yes, you can refer to the following Apple support articles for more information: https://support.apple.com/en-us/HT212317, https://support.apple.com/en-us/HT212324, and https://support.apple.com/en-us/HT212325