CVE-2021-30737
high-risk
Published 2021-09-08
A memory corruption issue in the ASN.1 decoder was addressed by removing the vulnerable code. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, iOS 12.5.4, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. Processing a maliciously crafted certificate may lead to arbitrary code execution.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (14)
Vendor Advisory
https://support.apple.com/en-us/HT212528
Vendor Advisory
https://support.apple.com/en-us/HT212529
Vendor Advisory
https://support.apple.com/en-us/HT212530
Vendor Advisory
https://support.apple.com/en-us/HT212531
Vendor Advisory
https://support.apple.com/en-us/HT212532
Vendor Advisory
https://support.apple.com/en-us/HT212533
Vendor Advisory
https://support.apple.com/en-us/HT212548
Vendor Advisory
https://support.apple.com/en-us/HT212528
Vendor Advisory
https://support.apple.com/en-us/HT212529
Vendor Advisory
https://support.apple.com/en-us/HT212530
Vendor Advisory
https://support.apple.com/en-us/HT212531
Vendor Advisory
https://support.apple.com/en-us/HT212532
Vendor Advisory
https://support.apple.com/en-us/HT212533
Vendor Advisory
https://support.apple.com/en-us/HT212548
55
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
2/34 · Minimal
Exposure
23/34 · High