First published: Tue Aug 24 2021(Updated: )
A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. A device may be passively tracked by its WiFi MAC address.
Credit: Fabien Duchêne UCLouvainFabien Duchêne UCLouvainFabien Duchêne UCLouvainFabien Duchêne UCLouvain cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.0 | |
Apple iPhone OS | <15.0 | |
Apple macOS | <12.0.1 | |
Apple tvOS | <15.0 | |
Apple watchOS | <8.0 | |
Apple tvOS | <15 | 15 |
Apple watchOS | <8 | 8 |
Apple iOS | <15 | 15 |
Apple iPadOS | <15 | 15 |
Apple macOS Monterey | <12.0.1 | 12.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-30866.
The title of the vulnerability is bootp. A user privacy issue was addressed by removing the broadcast MAC address.
The vulnerability is related to bootp and it is a user privacy issue that was addressed by removing the broadcast MAC address.
The vulnerability affects multiple software products, including Apple watchOS up to version 8, Apple iOS up to version 15, Apple iPadOS up to version 15, Apple macOS Monterey up to version 12.0.1, and Apple tvOS up to version 15.
Yes, there are remedies available for the vulnerability. Please refer to the official Apple support page for each affected software product for more information.