ID

VAR-202108-1287


CVE

CVE-2021-30972


TITLE

apple's  Apple Mac OS X  and  macOS  Fraud related to unauthorized authentication in

Trust: 0.8

sources: JVNDB: JVNDB-2021-021210

DESCRIPTION

This issue was addressed with improved checks. This issue is fixed in Security Update 2022-001 Catalina, macOS Big Sur 11.6.3. A malicious application may be able to bypass certain Privacy preferences. apple's Apple Mac OS X and macOS Exists in a fraudulent authentication vulnerability.Information may be tampered with. Information about the security content is also available at https://support.apple.com/HT213055. Audio Available for: macOS Big Sur Impact: Parsing a maliciously crafted audio file may lead to disclosure of user information Description: A buffer overflow issue was addressed with improved memory handling. CVE-2021-30960: JunDong Xie of Ant Security Light-Year Lab iCloud Available for: macOS Big Sur Impact: An application may be able to access a user's files Description: An issue existed within the path validation logic for symlinks. CVE-2022-22585: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab (https://xlab.tencent.com) IOMobileFrameBuffer Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. CVE-2022-22587: an anonymous researcher, Meysam Firouzi (@R00tkitSMM) of MBition - Mercedes-Benz Innovation Lab, Siddharth Aeri (@b1n4r1b01) Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow issue was addressed with improved memory handling. CVE-2022-22593: Peter Nguyễn Vũ Hoàng of STAR Labs Model I/O Available for: macOS Big Sur Impact: Processing a maliciously crafted STL file may lead to unexpected application termination or arbitrary code execution Description: An information disclosure issue was addressed with improved state management. CVE-2022-22579: Mickey Jin (@patch1t) of Trend Micro PackageKit Available for: macOS Big Sur Impact: An application may be able to access restricted files Description: A permissions issue was addressed with improved validation. CVE-2022-22583: an anonymous researcher, Ron Hass (@ronhass7) of Perception Point, Mickey Jin (@patch1t) TCC Available for: macOS Big Sur Impact: A malicious application may be able to bypass certain Privacy preferences Description: This issue was addressed with improved checks. CVE-2021-30972: Xuxiang Yang (@another1024), Zhipeng Huo (@R3dF09), and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com), Wojciech Reguła (@_r3ggi), jhftss (@patch1t), Csaba Fitzl (@theevilbit) of Offensive Security Additional recognition Kernel We would like to acknowledge Tao Huang for their assistance. Metal We would like to acknowledge Tao Huang for their assistance. PackageKit We would like to acknowledge Mickey Jin (@patch1t) of Trend Micro for their assistance. Installation note: This update may be obtained from the Mac App Store Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmHx05IACgkQeC9qKD1p rhjtWQ//TmET3pnDZUsC66AAWcqn+nGUr6ChR/uSDIZRAUqxwBxLt+bRZWRdGaXt 1Ew0Lg1Ww/E/mC1t9FCiLMqrCKH6uwddwtM9uHAuM5pUgW7RssFqrVGSRv8Ge1+h yWP4ZeSd6vy6QaGceNUU+W4XhIVgbcqeSrnFK3fjLFpWrlFk3WEVXyazxXckYKeN i5SMI4w71oZymSILmZNaL79bUJa7oZcYQXG08x5KrFEDC3rV8OdollQvMYwKn3kG kp+yW94rxna1ayhKkmiyNmnWbqWtGpJ/QEk44KeHWTz2mY/qAiWv4LpadGjccrdy tF6O2Ugp+6kSA1VnT0hpcKhC/I6s5tuLXB9QKN01H1754gZvwusTZm+Uwt5Z4OzR ZFeMPfJ7POx6HN2jORLh5Pa19f8DeqSJ+LqX95v5C/FyW2XjKc0X6HpCUCcdVD2p qbuaFcrE5fb1q2gxa4/DG+c6oiElKMh+tivIDNW39/roNCfmhpex52hxRtRxh7N3 xl4GPqlhquyl+yav7lrFZOgDsegR64gBPjkkn0e2JnTnJNDgKa9Kg/PhMNfymF2F k+t0/V/rl0w3Yv6wyWzG1b3Uwu0ermWBOmVfM39DfbGaTdXn9EIZW4YtuEAM6tcX ljuc39qmE5yg6YHKmGyP8ms0lSIEK58NyAK3Aid/aip3RAuXMCE= =+OmT -----END PGP SIGNATURE-----

Trust: 1.98

sources: NVD: CVE-2021-30972 // JVNDB: JVNDB-2021-021210 // VULHUB: VHN-390705 // VULMON: CVE-2021-30972 // PACKETSTORM: 165774 // PACKETSTORM: 165773

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.6.3

Trust: 1.0

vendor:applemodel:macosscope:eqversion:12.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:applemodel:macosscope:eqversion:12.0.1

Trust: 1.0

vendor:アップルmodel:macosscope:eqversion:12.0.0

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:12.0.1

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:11.0 that's all 11.6.3

Trust: 0.8

vendor:アップルmodel:apple mac os xscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-021210 // NVD: CVE-2021-30972

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30972
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-30972
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202108-2076
value: MEDIUM

Trust: 0.6

VULHUB: VHN-390705
value: LOW

Trust: 0.1

VULMON: CVE-2021-30972
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-30972
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-390705
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30972
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-30972
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-390705 // VULMON: CVE-2021-30972 // JVNDB: JVNDB-2021-021210 // CNNVD: CNNVD-202108-2076 // NVD: CVE-2021-30972

PROBLEMTYPE DATA

problemtype:CWE-863

Trust: 1.1

problemtype:Illegal authentication (CWE-863) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-390705 // JVNDB: JVNDB-2021-021210 // NVD: CVE-2021-30972

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202108-2076

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-202108-2076

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-390705

PATCH

title:HT213056 Apple  Security updateurl:https://support.apple.com/en-us/HT213055

Trust: 0.8

title:Apple macOS Big Sur Fixes for permissions and access control issues vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186814

Trust: 0.6

title: - url:https://github.com/another1024/another1024

Trust: 0.1

sources: VULMON: CVE-2021-30972 // JVNDB: JVNDB-2021-021210 // CNNVD: CNNVD-202108-2076

EXTERNAL IDS

db:NVDid:CVE-2021-30972

Trust: 3.6

db:PACKETSTORMid:165774

Trust: 0.8

db:JVNDBid:JVNDB-2021-021210

Trust: 0.8

db:CS-HELPid:SB2022012634

Trust: 0.6

db:AUSCERTid:ESB-2022.0400

Trust: 0.6

db:CNNVDid:CNNVD-202108-2076

Trust: 0.6

db:PACKETSTORMid:165773

Trust: 0.2

db:VULHUBid:VHN-390705

Trust: 0.1

db:VULMONid:CVE-2021-30972

Trust: 0.1

sources: VULHUB: VHN-390705 // VULMON: CVE-2021-30972 // JVNDB: JVNDB-2021-021210 // PACKETSTORM: 165774 // PACKETSTORM: 165773 // CNNVD: CNNVD-202108-2076 // NVD: CVE-2021-30972

REFERENCES

url:https://support.apple.com/en-us/ht213055

Trust: 2.4

url:https://support.apple.com/kb/ht212978

Trust: 1.8

url:https://support.apple.com/en-us/ht213056

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-30972

Trust: 1.0

url:https://www.auscert.org.au/bulletins/esb-2022.0400

Trust: 0.6

url:https://packetstormsecurity.com/files/165774/apple-security-advisory-2022-01-26-4.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012634

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-37394

Trust: 0.6

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22593

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22579

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22583

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/863.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/another1024/another1024

Trust: 0.1

url:http://seclists.org/fulldisclosure/2022/jan/80

Trust: 0.1

url:https://support.apple.com/ht213056.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30960

Trust: 0.1

url:https://xlab.tencent.com)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22587

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22585

Trust: 0.1

url:https://support.apple.com/ht213055.

Trust: 0.1

sources: VULHUB: VHN-390705 // VULMON: CVE-2021-30972 // JVNDB: JVNDB-2021-021210 // PACKETSTORM: 165774 // PACKETSTORM: 165773 // CNNVD: CNNVD-202108-2076 // NVD: CVE-2021-30972

CREDITS

Apple

Trust: 0.2

sources: PACKETSTORM: 165774 // PACKETSTORM: 165773

SOURCES

db:VULHUBid:VHN-390705
db:VULMONid:CVE-2021-30972
db:JVNDBid:JVNDB-2021-021210
db:PACKETSTORMid:165774
db:PACKETSTORMid:165773
db:CNNVDid:CNNVD-202108-2076
db:NVDid:CVE-2021-30972

LAST UPDATE DATE

2024-08-14T12:44:28.107000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-390705date:2022-10-08T00:00:00
db:VULMONid:CVE-2021-30972date:2022-10-08T00:00:00
db:JVNDBid:JVNDB-2021-021210date:2024-07-18T08:19:00
db:CNNVDid:CNNVD-202108-2076date:2022-05-30T00:00:00
db:NVDid:CVE-2021-30972date:2023-11-07T03:34:08.170

SOURCES RELEASE DATE

db:VULHUBid:VHN-390705date:2021-08-24T00:00:00
db:VULMONid:CVE-2021-30972date:2021-08-24T00:00:00
db:JVNDBid:JVNDB-2021-021210date:2024-07-18T00:00:00
db:PACKETSTORMid:165774date:2022-01-31T15:46:38
db:PACKETSTORMid:165773date:2022-01-31T15:46:23
db:CNNVDid:CNNVD-202108-2076date:2021-08-24T00:00:00
db:NVDid:CVE-2021-30972date:2021-08-24T19:15:22.953