First published: Mon Dec 13 2021(Updated: )
TCC. A logic issue was addressed with improved state management.
Credit: @gorelics @gorelics @gorelics @gorelics @gorelics product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.2 | |
Apple iPhone OS | <15.2 | |
Apple Mac OS X | >=10.15<10.15.7 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-004 | |
Apple Mac OS X | =10.15.7-security_update_2021-005 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-security_update_2021-007 | |
Apple macOS | >=11.0<11.6.2 | |
Apple macOS | >=12.0<12.1 | |
Apple watchOS | <=8.3 | |
Apple macOS Big Sur | <11.6.2 | 11.6.2 |
Apple watchOS | <8.3 | 8.3 |
Apple iOS | <15.2 | 15.2 |
Apple iPadOS | <15.2 | 15.2 |
Apple Catalina | ||
Apple macOS Monterey | <12.1 | 12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-30767.
The affected software includes macOS Big Sur 11.6.2, Apple Catalina, macOS Monterey 12.1, Apple iOS up to 15.2, Apple iPadOS up to 15.2, and watchOS up to 8.3.
The severity of CVE-2021-30767 has not been specified.
The remedy for CVE-2021-30767 is to update the affected software to the specified versions.
You can find more information about CVE-2021-30767 on the Apple support website. Here are the references: [Apple Support - HT212978](https://support.apple.com/en-us/HT212978), [Apple Support - HT212979](https://support.apple.com/en-us/HT212979), [Apple Support - HT212975](https://support.apple.com/en-us/HT212975)