Apple iOS and iPadOS Could Allow for Arbitrary Code Execution

Fortify Security Team
Oct 12, 2021

A vulnerability has been discovered in iOS and iPadOS which could allow for arbitrary code execution with kernel privileges. iOS and iPadOS are operating systems for Apple’s mobile devices including the iPhone, iPad, and iPod touch. Successful exploitation of this vulnerability would allow an attacker to install programs and view, change, or delete any data due to kernel privileges.

THREAT INTELLIGENCE: Apple has reported that CVE-2021-30883 is being exploited in the wild.

SYSTEMS AFFECTED:

  • iOS prior to 15.0.2
  • iPadOS prior to 15.0.2

RISK:

Government:

  • Large and medium government entities: High
  • Small government entities: Medium

Businesses:

  • Large and medium business entities: High
  • Small business entities: Medium

Home users: Medium

TECHNICAL SUMMARY:

An integer overflow vulnerability has been discovered in iOS and iPadOS which could allow for arbitrary code execution with kernel privileges. This has been addressed in the latest patch via improved memory handling.

Successful exploitation of this vulnerability would allow an attacker to install programs and view, change, or delete any data due to kernel privileges.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Apply appropriate patches provided by Apple to vulnerable systems immediately after appropriate testing.
  • Remind users not to download, accept or execute files from untrusted and unknown sources.
  • Remind users not to visit untrusted websites or follow links provided by untrusted or unknown sources.

REFERENCES:

Apple:

https://support.apple.com/en-us/HT212846

HelpNetSecurity:

https://www.helpnetsecurity.com/2021/10/12/cve-2021-30883/

CVE:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30883

Recent Posts

Multiple Vulnerabilities in Google Android OS

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches....

Google Chrome Could Allow for Arbitrary Code Execution

A vulnerability has been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the vulnerability could allow for arbitrary code execution...

iOS Could Allow For Arbitrary Code Execution

A vulnerability has been discovered in Apple Products which could allow for arbitrary code execution. iOS is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. Successful exploitation could allow the attacker to execute...

Google Chrome Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could...