First published: Mon Jul 19 2021(Updated: )
A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.
Credit: Linus Henze (pinauten.de) Linus Henze (pinauten.de) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <14.7 | |
Apple tvOS | <14.7 | |
Apple watchOS | <7.6 | |
Apple watchOS | <7.6 | 7.6 |
Apple tvOS | <14.7 | 14.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30770 is a vulnerability in the Kernel that was addressed with improved validation.
The affected software includes Apple watchOS up to version 7.6 and Apple tvOS up to version 14.7.
To fix CVE-2021-30770, update your Apple watchOS to version 7.6 or later and Apple tvOS to version 14.7 or later.
You can find more information about CVE-2021-30770 in the following references: [Apple Support Article 1](https://support.apple.com/en-us/HT212604) and [Apple Support Article 2](https://support.apple.com/en-us/HT212605).
The severity of CVE-2021-30770 has not been specified.