Search for vulnerabilities
Vulnerability details: VCID-xhap-ctmn-aaac
Vulnerability ID VCID-xhap-ctmn-aaac
Aliases CVE-2021-30858
Summary A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-30858.html
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4097
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4686
rhas Moderate https://access.redhat.com/errata/RHSA-2022:0059
rhas Moderate https://access.redhat.com/errata/RHSA-2022:0075
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00541 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.00716 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01026 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.01171 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.0118 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
epss 0.11061 https://api.first.org/data/v1/epss?cve=CVE-2021-30858
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2006099
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/25
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/25
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/25
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/25
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/27
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/27
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/27
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/27
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/29
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/29
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/29
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/29
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/38
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/38
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/38
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/38
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/39
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/39
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2021/Sep/50
ssvc Attend http://seclists.org/fulldisclosure/2021/Sep/50
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
ssvc Attend https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
ssvc Attend https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
ssvc Attend https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2021-30858
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2021-30858
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2021-30858
archlinux High https://security.archlinux.org/AVG-2399
archlinux High https://security.archlinux.org/AVG-2400
cvssv3.1 8.8 https://support.apple.com/en-us/HT212804
cvssv3.1 8.8 https://support.apple.com/en-us/HT212804
ssvc Attend https://support.apple.com/en-us/HT212804
ssvc Attend https://support.apple.com/en-us/HT212804
cvssv3.1 8.8 https://support.apple.com/en-us/HT212807
cvssv3.1 8.8 https://support.apple.com/en-us/HT212807
ssvc Attend https://support.apple.com/en-us/HT212807
ssvc Attend https://support.apple.com/en-us/HT212807
cvssv3.1 8.8 https://support.apple.com/kb/HT212824
ssvc Attend https://support.apple.com/kb/HT212824
generic_textual Medium https://ubuntu.com/security/notices/USN-5087-1
generic_textual Medium https://webkitgtk.org/security/WSA-2021-0005.html
generic_textual Medium https://webkitgtk.org/security/WSA-2021-0006.html
cvssv3.1 8.8 https://www.debian.org/security/2021/dsa-4975
ssvc Attend https://www.debian.org/security/2021/dsa-4975
cvssv3.1 8.8 https://www.debian.org/security/2021/dsa-4976
ssvc Attend https://www.debian.org/security/2021/dsa-4976
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2021/09/20/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2021/09/20/1
ssvc Attend http://www.openwall.com/lists/oss-security/2021/09/20/1
ssvc Attend http://www.openwall.com/lists/oss-security/2021/09/20/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2021/10/26/9
ssvc Attend http://www.openwall.com/lists/oss-security/2021/10/26/9
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2021/10/27/1
ssvc Attend http://www.openwall.com/lists/oss-security/2021/10/27/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2021/10/27/2
ssvc Attend http://www.openwall.com/lists/oss-security/2021/10/27/2
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2021/10/27/4
ssvc Attend http://www.openwall.com/lists/oss-security/2021/10/27/4
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-30858.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json
https://api.first.org/data/v1/epss?cve=CVE-2021-30858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
http://seclists.org/fulldisclosure/2021/Sep/25
http://seclists.org/fulldisclosure/2021/Sep/27
http://seclists.org/fulldisclosure/2021/Sep/29
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/50
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
https://support.apple.com/en-us/HT212804
https://support.apple.com/en-us/HT212807
https://support.apple.com/kb/HT212824
https://ubuntu.com/security/notices/USN-5087-1
https://webkitgtk.org/security/WSA-2021-0005.html
https://webkitgtk.org/security/WSA-2021-0006.html
https://www.debian.org/security/2021/dsa-4975
https://www.debian.org/security/2021/dsa-4976
http://www.openwall.com/lists/oss-security/2021/09/20/1
http://www.openwall.com/lists/oss-security/2021/10/26/9
http://www.openwall.com/lists/oss-security/2021/10/27/1
http://www.openwall.com/lists/oss-security/2021/10/27/2
http://www.openwall.com/lists/oss-security/2021/10/27/4
2006099 https://bugzilla.redhat.com/show_bug.cgi?id=2006099
AVG-2399 https://security.archlinux.org/AVG-2399
AVG-2400 https://security.archlinux.org/AVG-2400
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-30858 https://nvd.nist.gov/vuln/detail/CVE-2021-30858
GLSA-202202-01 https://security.gentoo.org/glsa/202202-01
RHSA-2021:4097 https://access.redhat.com/errata/RHSA-2021:4097
RHSA-2021:4686 https://access.redhat.com/errata/RHSA-2021:4686
RHSA-2022:0059 https://access.redhat.com/errata/RHSA-2022:0059
RHSA-2022:0075 https://access.redhat.com/errata/RHSA-2022:0075
USN-5087-1 https://usn.ubuntu.com/5087-1/
Data source KEV
Date added Nov. 3, 2021
Description Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.
Required action Apply updates per vendor instructions.
Due date Nov. 17, 2021
Note
https://nvd.nist.gov/vuln/detail/CVE-2021-30858
Ransomware campaign use Unknown
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/25
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/25
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/25

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/25
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/27
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/27
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/27

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/27
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/29
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/29
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/29

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/29
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/38
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/38
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/38

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/38
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/39
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/39
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2021/Sep/50
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://seclists.org/fulldisclosure/2021/Sep/50
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-30858
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-30858
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-30858
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT212804
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT212804
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://support.apple.com/en-us/HT212804

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://support.apple.com/en-us/HT212804
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT212807
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT212807
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://support.apple.com/en-us/HT212807

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://support.apple.com/en-us/HT212807
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/kb/HT212824
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://support.apple.com/kb/HT212824
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2021/dsa-4975
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://www.debian.org/security/2021/dsa-4975
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2021/dsa-4976
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at https://www.debian.org/security/2021/dsa-4976
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/09/20/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/09/20/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://www.openwall.com/lists/oss-security/2021/09/20/1

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://www.openwall.com/lists/oss-security/2021/09/20/1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/10/26/9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://www.openwall.com/lists/oss-security/2021/10/26/9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/10/27/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://www.openwall.com/lists/oss-security/2021/10/27/1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/10/27/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://www.openwall.com/lists/oss-security/2021/10/27/2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2021/10/27/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/ Found at http://www.openwall.com/lists/oss-security/2021/10/27/4
Exploit Prediction Scoring System (EPSS)
Percentile 0.77131
EPSS Score 0.00541
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.