ID

VAR-202108-1258


CVE

CVE-2021-30943


TITLE

Session expiration vulnerability in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2021-021004

DESCRIPTION

An issue in the handling of group membership was resolved with improved logic. This issue is fixed in iOS 15.2 and iPadOS 15.2, watchOS 8.3, macOS Monterey 12.1. A malicious user may be able to leave a messages group but continue to receive messages in that group. iPadOS , iOS , macOS There is a vulnerability related to session expiration in multiple Apple products, such as:Information may be obtained. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none

Trust: 1.8

sources: NVD: CVE-2021-30943 // JVNDB: JVNDB-2021-021004 // VULHUB: VHN-390676 // VULMON: CVE-2021-30943

AFFECTED PRODUCTS

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.2

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.2

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:8.3

Trust: 1.0

vendor:アップルmodel:watchosscope:eqversion:8.3

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-021004 // NVD: CVE-2021-30943

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30943
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-30943
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202108-2046
value: MEDIUM

Trust: 0.6

VULHUB: VHN-390676
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-30943
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-390676
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30943
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-30943
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-390676 // JVNDB: JVNDB-2021-021004 // CNNVD: CNNVD-202108-2046 // NVD: CVE-2021-30943

PROBLEMTYPE DATA

problemtype:CWE-613

Trust: 1.1

problemtype:Inappropriate session deadline (CWE-613) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-390676 // JVNDB: JVNDB-2021-021004 // NVD: CVE-2021-30943

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-2046

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202108-2046

PATCH

title:HT212976 Apple  Security updateurl:https://support.apple.com/en-us/HT212975

Trust: 0.8

title:Multiple Apple Product code issue vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194527

Trust: 0.6

sources: JVNDB: JVNDB-2021-021004 // CNNVD: CNNVD-202108-2046

EXTERNAL IDS

db:NVDid:CVE-2021-30943

Trust: 3.4

db:JVNDBid:JVNDB-2021-021004

Trust: 0.8

db:CNNVDid:CNNVD-202108-2046

Trust: 0.6

db:VULHUBid:VHN-390676

Trust: 0.1

db:VULMONid:CVE-2021-30943

Trust: 0.1

sources: VULHUB: VHN-390676 // VULMON: CVE-2021-30943 // JVNDB: JVNDB-2021-021004 // CNNVD: CNNVD-202108-2046 // NVD: CVE-2021-30943

REFERENCES

url:https://support.apple.com/en-us/ht212975

Trust: 1.7

url:https://support.apple.com/en-us/ht212976

Trust: 1.7

url:https://support.apple.com/en-us/ht212978

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-30943

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-390676 // VULMON: CVE-2021-30943 // JVNDB: JVNDB-2021-021004 // CNNVD: CNNVD-202108-2046 // NVD: CVE-2021-30943

SOURCES

db:VULHUBid:VHN-390676
db:VULMONid:CVE-2021-30943
db:JVNDBid:JVNDB-2021-021004
db:CNNVDid:CNNVD-202108-2046
db:NVDid:CVE-2021-30943

LAST UPDATE DATE

2024-08-14T14:31:39.774000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-390676date:2023-01-09T00:00:00
db:VULMONid:CVE-2021-30943date:2021-08-24T00:00:00
db:JVNDBid:JVNDB-2021-021004date:2024-07-17T02:27:00
db:CNNVDid:CNNVD-202108-2046date:2022-06-01T00:00:00
db:NVDid:CVE-2021-30943date:2023-11-07T03:33:58.667

SOURCES RELEASE DATE

db:VULHUBid:VHN-390676date:2021-08-24T00:00:00
db:VULMONid:CVE-2021-30943date:2021-08-24T00:00:00
db:JVNDBid:JVNDB-2021-021004date:2024-07-17T00:00:00
db:CNNVDid:CNNVD-202108-2046date:2021-08-24T00:00:00
db:NVDid:CVE-2021-30943date:2021-08-24T19:15:21.267