CISA KEV 정보
| 취약점명 | Apple Multiple Products WebKit Storage Use-After-Free Vulnerability |
|---|---|
| 설명 | Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit Storage contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-416 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2021-11-17 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2021-30661 |
NVD 상세 정보
CVSS v3.1: 8.8 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVSS v2.0: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P설명: A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
CWE: CWE-416 | CWE-416
참조
- https://support.apple.com/en-us/HT212317 [Vendor Advisory]
- https://support.apple.com/en-us/HT212318 [Vendor Advisory]
- https://support.apple.com/en-us/HT212323 [Vendor Advisory]
- https://support.apple.com/en-us/HT212324 [Vendor Advisory]
- https://support.apple.com/en-us/HT212325 [Vendor Advisory]
- https://support.apple.com/en-us/HT212341 [Vendor Advisory]
- https://support.apple.com/en-us/HT212317 [Vendor Advisory]
- https://support.apple.com/en-us/HT212318 [Vendor Advisory]
- https://support.apple.com/en-us/HT212323 [Vendor Advisory]
- https://support.apple.com/en-us/HT212324 [Vendor Advisory]
- https://support.apple.com/en-us/HT212325 [Vendor Advisory]
- https://support.apple.com/en-us/HT212341 [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30661 [Third Party Advisory, US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.