macOS Big Sur, iOS and iPadOS Vulnerability

Fortify Security Team
Jul 27, 2021

A vulnerability has been discovered in macOS Big Sur, iOS and iPadOS, which could allow for arbitrary code execution.

  • iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.
  • iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.
  • macOS Big Sur is the 17th and current major release of macOS.

Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with kernel privileges to take full control over a device.

THREAT INTELLIGENCE:
Apple is aware of a report that this issue may have been actively exploited to plant malware on vulnerable devices. (CVE-2021-30807)

SYSTEMS AFFECTED:

  • iOS prior to version 14.7.1
  • iPadOS prior to version 14.7.1
  • macOS Big Sur prior to version 11.5.1

RISK:
Government:

  • Large and medium government entities: High
  • Small government entities: High

Businesses:

  • Large and medium business entities: High
  • Small business entities: High

Home users: Low

TECHNICAL SUMMARY:
A vulnerability has been discovered in macOS Big Sur, iOS and iPadOS that could allow for arbitrary code execution. This vulnerability occurs due to a memory corruption issue in IOMobileFrameBuffer that was addressed with improved memory handling. Successful exploitation of this vulnerability could result in arbitrary code execution with kernel privileges to take full control over a device.

RECOMMENDATIONS:
We recommend the following actions be taken:

  • Apply appropriate patches provided by Apple to vulnerable systems immediately after appropriate testing.
  • Run all software as a nonprivileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to download, accept or execute files from untrusted and unknown sources.
  • Remind users not to visit untrusted websites or follow links provided by untrusted or unknown sources.
  • Evaluate read, write, and execute permissions on all newly installed software.
  • Apply the Principle of Least Privilege to all systems and services.

REFERENCES:
Apple:
https://support.apple.com/en-us/HT212622
https://support.apple.com/en-us/HT212623

CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30807

Security Affairs:
https://securityaffairs.co/wordpress/120576/security/apple-cve-2021-30807-zero-day.html

Recent Posts

Mozilla Products Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web...

Apple Products Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. macOS Ventura is the 19th and current major release of macOS iOS is a mobile operating system for mobile devices, including the iPhone,...

Citrix ADC and Gateway Could Allow for Authentication Bypass

Multiple vulnerabilities have been discovered in Citrix ADC and Gateway, the most severe of which could allow for Authentication Bypass. Citrix ADC and Gateway is an Application Delivery Controller and a gateway service to products respectively. Successful...