First published: Mon May 24 2021(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, tvOS 14.6, watchOS 7.5, iOS 14.6 and iPadOS 14.6. A malicious application may be able to modify protected parts of the file system.
Credit: Cees Elzinga Cees Elzinga Cees Elzinga Cees Elzinga product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <14.6 | 14.6 |
Apple iPadOS | <14.6 | 14.6 |
Apple macOS Big Sur | <11.4 | 11.4 |
Apple tvOS | <14.6 | 14.6 |
Apple watchOS | <7.5 | 7.5 |
Apple iPadOS | <14.6 | |
Apple iPhone OS | <14.6 | |
Apple macOS | >=11.0.1<11.4 | |
Apple tvOS | <14.6 | |
Apple watchOS | <7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30727 is a vulnerability in Crash Reporter that was addressed with improved state management.
CVE-2021-30727 affects Apple tvOS 14.6, Apple watchOS 7.5, Apple macOS Big Sur 11.4, Apple iOS 14.6, and Apple iPadOS 14.6.
The severity of CVE-2021-30727 has not been specified.
To fix CVE-2021-30727, update your Apple device to the recommended software version: tvOS 14.6, watchOS 7.5, macOS Big Sur 11.4, iOS 14.6, or iPadOS 14.6.
You can find more information about CVE-2021-30727 on the Apple support website: [link1], [link2], [link3].