x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER:

2021-116

DATE(S) ISSUED:

09/21/2021

OVERVIEW:

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.

  • iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.
  • iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.
  • Safari is a graphical web browser developed by Apple, based on the WebKit engine.
  • watchOS is the mobile operating system for Apple Watch and is based on the iOS operating system.
  • tvOS is an operating system for fourth-generation Apple TV digital media player.
  • Xcode is an integrated development environment (IDE) for macOS.
  • iTunes for Windows is a media player, media library, Internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store.

Successful exploitation of the most severe of these vulnerabilities could result in arbitrary code execution in the context of the affected user.

THREAT INTELLIGENCE:

There are no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • iOS prior to version 15.0
  • iPadOS prior to version 15.0
  • watchOS prior to version 8.0
  • tvOS prior to version 15.0
  • Xcode prior to version 13.0
  • Safari prior to version 15.0
  • iTunes for Windows prior to version 12.12

RISK:

Government:
  • Large and medium government entities: HIGH
  • Small government entities: MEDIUM
Businesses:
  • Large and medium business entities: HIGH
  • Small business entities: MEDIUM
Home Users:
LOW

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution in the context of the affected user. Details of these vulnerabilities are as follows:

iOS 15 and iPadOS 15

  • An application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30837)
  • A local attacker may be able to read sensitive information. (CVE-2021-30811)
  • A malicious application may be able to execute arbitrary code with system privileges on devices with an Apple Neural Engine (CVE-2021-30838)
  • A local attacker may be able to cause unexpected application termination or arbitrary code execution. (CVE-2021-30825)
  • A 3D model constructed to look like the enrolled user may be able to authenticate via Face ID. (CVE-2021-30863)
  • a maliciously crafted dfont file may lead to arbitrary code execution. (CVE-2021-30841, CVE-2021-30842, CVE-2021-30843)
  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • A malicious application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30857)
  • A remote attacker may be able to cause a denial of service. (CVE-2013-0340)
  • Processing a maliciously crafted USD file may disclose memory contents. (CVE-2021-30819)
  • An application may be able to access restricted files. (CVE-2021-30855)
  • A sandboxed process may be able to circumvent sandbox restrictions. (CVE-2021-30854)
  • A local attacker may be able to view contacts from the lock screen. (CVE-2021-30815)
  • In certain situations, the baseband would fail to enable integrity and ciphering protection. (CVE-2021-30826)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30848, CVE-2021-30851)
  • An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup. (CVE-2021-30810)

watchOS 8

  • An application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30837)
  • A local attacker may be able to read sensitive information. (CVE-2021-30811)
  • Processing a maliciously crafted dfont file may lead to arbitrary code execution. (CVE-2021-30841, CVE-2021-30842, CVE-2021-30843)
  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • A malicious application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30857)
  • A remote attacker may be able to cause a denial of service. (CVE-2013-0340)
  • An application may be able to access restricted files. (CVE-2021-30855)
  • A sandboxed process may be able to circumvent sandbox restrictions. (CVE-2021-30854)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30851)
  • An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup. (CVE-2021-30810)

tvOS 15

  • An application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30837)
  • Processing a maliciously crafted dfont file may lead to arbitrary code execution. (CVE-2021-30841, CVE-2021-30842, CVE-2021-30843)
  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • A malicious application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30857)
  • A remote attacker may be able to cause a denial of service. (CVE-2013-0340)
  • A sandboxed process may be able to circumvent sandbox restrictions. (CVE-2021-30854)
  • A user may gain access to protected parts of the file system. (CVE-2021-30850)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30851)
  • An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup. (CVE-2021-30810)

Xcode 13

  • Multiple issues in nginx (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747, CVE-2017-7529, CVE-2018-16843, CVE-2018-16844, CVE-2018-16845, CVE-2019-20372)

Safari 15

  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30849, CVE-2021-30851)

iTunes 12.12 for Windows

  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)

Successful exploitation of the most severe of these vulnerabilities could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Apply appropriate patches provided by Apple to vulnerable systems immediately after appropriate testing.
  • Run all software as a nonprivileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to download, accept or execute files from untrusted and unknown sources.
  • Remind users not to visit untrusted websites or follow links provided by untrusted or unknown sources.
  • Evaluate read, write, and execute permissions on all newly installed software.
  • Apply the Principle of Least Privilege to all systems and services.

REFERENCES:

CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16844 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30810 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30825 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30826 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30837 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30838 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30843 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30847 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30850 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30857 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30863

Get Email Updates When Cyber Threats Like This Arise

Arrow Subscribe to Advisories

Information Hub : Advisories


CONTROL: 1 --- ADVISORY CONTROL: 0
CONTROL: 2 --- ADVISORY CONTROL: 0
CONTROL: 3 --- ADVISORY CONTROL: 0

Pencil Blog post 20 Oct 2021
CONTROL: 4 --- ADVISORY CONTROL: 0