First published: Tue Aug 24 2021(Updated: )
Model I/O. An out-of-bounds read was addressed with improved bounds checking.
Credit: Mickey Jin @patch1t Trend MicroMickey Jin @patch1t Trend MicroMickey Jin @patch1t Trend MicroMickey Jin @patch1t Trend MicroMickey Jin @patch1t Trend Micro cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.1 | |
Apple iPhone OS | <15.1 | |
Apple Mac OS X | <10.15.7 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-004 | |
Apple Mac OS X | =10.15.7-security_update_2021-005 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.6.1 | |
Apple macOS | =12.0 | |
Apple tvOS | <15.1 | |
Apple iOS | <15.1 | 15.1 |
Apple iPadOS | <15.1 | 15.1 |
Apple macOS Big Sur | <11.6.1 | 11.6.1 |
Apple tvOS | <15.1 | 15.1 |
Apple macOS Monterey | <12.0.1 | 12.0.1 |
Apple Catalina | ||
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30910 refers to a vulnerability in Model I/O that allowed for an out-of-bounds read, which has been addressed with improved bounds checking.
Users of Apple products including Apple Catalina, macOS Big Sur, iOS, iPadOS, macOS Monterey, and tvOS are affected by CVE-2021-30910.
You can check if your system is affected by CVE-2021-30910 by reviewing the list of affected software versions provided by Apple in their security advisory.
To fix CVE-2021-30910, you should update your Apple device to the recommended software version provided by Apple in their security advisory.
You can find more information about CVE-2021-30910 in the security advisory published by Apple, which includes mitigation steps and links to additional resources.