First published: Mon May 24 2021(Updated: )
A memory corruption issue in the ASN.1 decoder was addressed by removing the vulnerable code. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, iOS 12.5.4, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. Processing a maliciously crafted certificate may lead to arbitrary code execution.
Credit: xerub xerub xerub xerub xerub xerub xerub product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <14.6 | |
Apple iPhone OS | <12.5.4 | |
Apple iPhone OS | >=13.0<14.6 | |
Apple Mac OS X | >=10.14.0<=10.14.5 | |
Apple Mac OS X | >=10.15<=10.15.5 | |
Apple Mac OS X | =10.14.6 | |
Apple Mac OS X | =10.14.6-security_update_2019-001 | |
Apple Mac OS X | =10.14.6-security_update_2019-002 | |
Apple Mac OS X | =10.14.6-security_update_2019-004 | |
Apple Mac OS X | =10.14.6-security_update_2019-005 | |
Apple Mac OS X | =10.14.6-security_update_2019-006 | |
Apple Mac OS X | =10.14.6-security_update_2019-007 | |
Apple Mac OS X | =10.14.6-security_update_2020-001 | |
Apple Mac OS X | =10.14.6-security_update_2020-002 | |
Apple Mac OS X | =10.14.6-security_update_2020-003 | |
Apple Mac OS X | =10.14.6-security_update_2020-004 | |
Apple Mac OS X | =10.14.6-security_update_2020-005 | |
Apple Mac OS X | =10.14.6-security_update_2020-006 | |
Apple Mac OS X | =10.14.6-security_update_2020-007 | |
Apple Mac OS X | =10.14.6-security_update_2021-001 | |
Apple Mac OS X | =10.14.6-security_update_2021-002 | |
Apple Mac OS X | =10.14.6-security_update_2021-003 | |
Apple Mac OS X | =10.14.6-supplemental_update | |
Apple Mac OS X | =10.14.6-supplemental_update_2 | |
Apple Mac OS X | =10.15.6 | |
Apple Mac OS X | =10.15.6-supplemental_update | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0.1<11.4 | |
Apple tvOS | <14.6 | |
Apple watchOS | <7.5 | |
Apple Mojave | ||
Apple iOS | <12.5.4 | 12.5.4 |
Apple macOS Big Sur | <11.4 | 11.4 |
Apple Catalina | ||
Apple watchOS | <7.5 | 7.5 |
Apple iOS | <14.6 | 14.6 |
Apple iPadOS | <14.6 | 14.6 |
Apple tvOS | <14.6 | 14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2021-30737 is a vulnerability that allows arbitrary code execution when processing a maliciously crafted certificate in certain Apple operating systems.
CVE-2021-30737 can be exploited by an attacker who crafts a malicious certificate and tricks a user into opening it, leading to arbitrary code execution.
CVE-2021-30737 affects Apple iOS, iPadOS, macOS, tvOS, watchOS, Catalina, and Mojave.
CVE-2021-30737 has a severity rating of critical.
To fix CVE-2021-30737, update your affected Apple operating system to the specified versions in the Apple security advisories.