First published: Mon May 24 2021(Updated: )
WebKit. A logic issue was addressed with improved restrictions.
Credit: Prakash @1lastBr3ath Prakash @1lastBr3ath an anonymous researcher 1lastBr3ath an anonymous researcher 1lastBr3ath Prakash @1lastBr3ath product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <14.1.1 | |
Apple iPadOS | <14.6 | |
Apple iPhone OS | <14.6 | |
Apple macOS | >=11.0<11.4 | |
Apple tvOS | <14.6 | |
Apple watchOS | <7.5 | |
Apple macOS Big Sur | <11.4 | 11.4 |
Apple watchOS | <7.5 | 7.5 |
Apple iOS | <14.6 | 14.6 |
Apple iPadOS | <14.6 | 14.6 |
Apple Safari | <14.1.1 | 14.1.1 |
Apple tvOS | <14.6 | 14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30682 is a vulnerability in WebKit that was addressed with improved restrictions.
CVE-2021-30682 affects Apple tvOS up to version 14.6, Apple watchOS up to version 7.5, Apple Safari up to version 14.1.1, Apple macOS Big Sur up to version 11.4, Apple iOS up to version 14.6, and Apple iPadOS up to version 14.6.
The severity of CVE-2021-30682 is not mentioned in the provided information.
To fix CVE-2021-30682, you should update the affected software to the versions mentioned in the remediation section provided by Apple.
You can find more information about CVE-2021-30682 on the Apple support website. Here are the references provided: [Link 1](https://support.apple.com/en-us/HT212533), [Link 2](https://support.apple.com/en-us/HT212529), [Link 3](https://support.apple.com/en-us/HT212534).