First published: Mon Jul 19 2021(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
Credit: Linus Henze (pinauten.de) Linus Henze (pinauten.de) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <14.7 | |
Apple tvOS | <14.7 | |
Apple watchOS | <7.6 | |
Apple watchOS | <7.6 | 7.6 |
Apple tvOS | <14.7 | 14.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-30769.
The affected software includes Apple watchOS up to version 7.6 and Apple tvOS up to version 14.7.
The severity of CVE-2021-30769 has not been specified.
CVE-2021-30769 is a logic issue that has been addressed with improved state management.
To fix the vulnerability, update your Apple watchOS to version 7.6 or later, and update your Apple tvOS to version 14.7 or later.