7.6
CVSSv2

CVE-2021-30955

Published: 24/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 678
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. A malicious application may be able to execute arbitrary code with kernel privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple watchos

apple iphone os

apple ipados

apple tvos

apple macos

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-12-15-2 macOS Monterey 121 macOS Monterey 121 addresses the following issues Information about the security content is also available at supportapplecom/HT212978 Airport Available for: macOS Monterey Impact: A device may be passively tracked via BSSIDs Description: An ac ...
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-12-15-5 tvOS 152 tvOS 152 addresses the following issues Information about the security content is also available at supportapplecom/HT212980 Audio Available for: Apple TV 4K and Apple TV HD Impact: Parsing a maliciously crafted audio file may lead to disclosure of user ...

Github Repositories

Jake Jame's proof of concept wrapped into an iOS app for CVE-2021-30955

CVE-2021-30955 POC Proof of concept (wrapped into an iOS app) for CVE-2021-30955 All credit to Jake James His POC code (used in this project) can be found here What is this? This demonstrates CVE-2021-30955, an iOS bug which allows an app in userspace to gain kernel-level permissions In order to demonstrate this, this POC crashes the kernel of an iOS device Why? This can (

iOS 15.1 kernel exploit POC for CVE-2021-30955

desc_race iOS 151 kernel exploit POC for CVE-2021-30955 Huge thanks to @realBrightiup for the awesome bug and exploit stratergy His writeup can be found at: wwwcyberklcom/cvelist/cvedetail/24

My starred Repos

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ai algorithm analytics android angular ansible api archlinux arduino artificial-intelligence automation awesome awesome-list aws azure backend bash bootstrap bot c chatgpt chatgpt-api chrome chrome-extension cli clojure code compiler computer-science cpp csharp css cybersecurity dart data-analys

Jake Jame's proof of concept wrapped into an iOS app for CVE-2021-30955

CVE-2021-30955 POC Proof of concept (wrapped into an iOS app) for CVE-2021-30955 All credit to Jake James His POC code (used in this project) can be found here What is this? This demonstrates CVE-2021-30955, an iOS bug which allows an app in userspace to gain kernel-level permissions In order to demonstrate this, this POC crashes the kernel of an iOS device Why? This can (

CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)

desc_race_A15 CVE-2021-30955 iOS 1511 POC for 6GB RAM devices (A14-A15) Made with SwiftUI and C Based off of @b1n4r1b01's exploit Write-up of @realBrightiup's POC Improves A14-A15 support Tested on iPhone 13 Pro Max

A test app to check if your device is vulnerable to CVE-2021-30955

Pentagram-exploit-tester A test app to check if your device is vulnerable to CVE-2021-30955 This tool incorporates @b1n4r1b01's kernel exploit based on CVE-2021-30955 and will run it on your device to test if the device is compatible Exploit is known to work with iOS 150 to 1511 and 152 BETA 1 4GB devices! If the device is compatible, you will get an alert telling y

desc_race exploit for iOS 15.0 - 15.1.1 (with stable kernel r/w primitives) (CVE-2021-30955)

desc_race "desc_race" (CVE-2021-30955) exploit for iOS 150 - 1511 (with stable kernel r/w primitives) Tested to work on iPhone13,2 running iOS 151 Exploit Method Increase the capacity of IOSurfaceClient array to 0x2000, goal is to write a pointer whose content is totally controlled and then use IOSurfaceRootUserClient interfaces to achieve kernel r/w The size o

Gexo is an ????-tethered (probably has to be rootless) iOS 15, 15.0.1, ~~15.0.2~~, 15.1 Beta 3, 15.1, & 15.1.1 jailbreak

Gexo (previously Fugu15) - ????-??tethered iOS 15 Jailbreak Gexo is an (most definitely incomplete) iOS 15 Jailbreak, using bind mounts (thanks siguza) or being rootless The CVE numbers of the vulnerabilities I used are: CVE-2021-30883 & CVE-2021-30955 Supported Devices/iOS Versions Gexo should support all arm64e devices (iPhone XS and newer) on iOS 15, 1501, 1502