6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
61.6%
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Recent assessments:
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
seclists.org/fulldisclosure/2021/Sep/25
seclists.org/fulldisclosure/2021/Sep/26
seclists.org/fulldisclosure/2021/Sep/27
seclists.org/fulldisclosure/2021/Sep/28
seclists.org/fulldisclosure/2021/Sep/38
seclists.org/fulldisclosure/2021/Sep/39
seclists.org/fulldisclosure/2021/Sep/40
seclists.org/fulldisclosure/2021/Sep/50
www.openwall.com/lists/oss-security/2022/09/02/11
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30860
security.gentoo.org/glsa/202209-21
support.apple.com/en-us/HT212804
support.apple.com/en-us/HT212805
support.apple.com/en-us/HT212806
support.apple.com/en-us/HT212807
support.apple.com/kb/HT212824
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
61.6%