First published: Tue Aug 24 2021(Updated: )
Core Telephony. A deserialization issue was addressed through improved validation.
Credit: Citizen Lab Google Project Zero Citizen Lab Google Project Zero Citizen Lab Google Project Zero cve@mitre.org Citizen Lab Google Project Zero Citizen Lab Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Catalina | ||
Apple macOS Big Sur | <11.6 | 11.6 |
Apple watchOS | <7.6.2 | 7.6.2 |
Apple iPadOS | <14.8 | |
Apple iPhone OS | >=12.0<12.5.5 | |
Apple iPhone OS | >=14.0<14.8 | |
Apple Mac OS X | >=10.15<10.15.7 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-security_update_2021-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-008 | |
Apple Mac OS X | =10.15.7-security_update_2022-001 | |
Apple Mac OS X | =10.15.7-security_update_2022-002 | |
Apple Mac OS X | =10.15.7-security_update_2022-003 | |
Apple Mac OS X | =10.15.7-security_update_2022-004 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.6 | |
Apple watchOS | <7.6.2 | |
Apple iOS | <12.5.5 | 12.5.5 |
Apple iOS | <14.8 | 14.8 |
Apple iPadOS | <14.8 | 14.8 |
Apple iOS, macOS, watchOS | ||
<14.8 | ||
>=12.0<12.5.5 | ||
>=14.0<14.8 | ||
>=10.15<10.15.7 | ||
=10.15.7 | ||
=10.15.7-security_update_2020 | ||
=10.15.7-security_update_2020-001 | ||
=10.15.7-security_update_2020-005 | ||
=10.15.7-security_update_2020-007 | ||
=10.15.7-security_update_2021-001 | ||
=10.15.7-security_update_2021-002 | ||
=10.15.7-security_update_2021-003 | ||
=10.15.7-security_update_2021-006 | ||
=10.15.7-security_update_2021-007 | ||
=10.15.7-security_update_2021-008 | ||
=10.15.7-security_update_2022-001 | ||
=10.15.7-security_update_2022-002 | ||
=10.15.7-security_update_2022-003 | ||
=10.15.7-security_update_2022-004 | ||
=10.15.7-supplemental_update | ||
>=11.0<11.6 | ||
<7.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-31010 is a vulnerability in Apple iOS, macOS, and watchOS that allows a sandboxed process to bypass sandbox restrictions.
CVE-2021-31010 affects Apple devices running iOS, macOS, and watchOS.
The severity of CVE-2021-31010 is not specified in the provided information.
To fix CVE-2021-31010, update your Apple devices to the recommended versions: iOS 12.5.5, macOS Big Sur 11.6, or watchOS 7.6.2.
You can find more information about CVE-2021-31010 on the official Apple support page: [CVE-2021-31010](https://support.apple.com/en-us/HT212804)