CVE-2021-30952
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to run harmful code on a user's device by tricking them into visiting a specially crafted website. It requires the user to open a malicious webpage in Safari, which could compromise their device and data.
Technical Description
An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Aug 24, 2021
over 4 years ago
Last Modified
Mar 6, 2026
about 1 month ago
Vendor
apple
Product
safari
Related Vulnerabilities
This vulnerability allows an attacker to potentially execute harmful code on a user's device by tricking them into viewing specially crafted web content. It primarily affects users of Safari on specific versions of macOS and iOS, and requires the victim to visit a malicious website for the attack to succeed.
An attacker can use a malicious human interface device (like a keyboard or mouse) to crash processes on iPads running specific versions of the operating system. This requires the attacker to physically connect their harmful device to the iPad, making it a localized threat.
This vulnerability allows an attacker to run their own harmful code on your device by tricking it into processing specially crafted web content. It can be exploited when users visit malicious websites, so keeping your device updated is crucial to protect against potential attacks.
This vulnerability allows an attacker to run any code they want on a device with full system access, which could lead to complete control over the device. It requires the attacker to trick the user into running a malicious app on iPadOS or iOS versions prior to the latest updates.