CVE-2021-1787

7.8 HIGH

📋 TL;DR

CVE-2021-1787 is a privilege escalation vulnerability in Apple operating systems that allows a local attacker to gain elevated privileges. This affects macOS, iOS, iPadOS, watchOS, and tvOS systems running outdated versions. Attackers with local access could potentially execute code with higher privileges than intended.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
  • watchOS
  • tvOS
Versions: Versions prior to macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4, iPadOS 14.4
Operating Systems: macOS, iOS, iPadOS, watchOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple operating systems are vulnerable. No special configuration required for exploitation.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains root/system-level privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrator/root access to bypass security controls and install additional payloads.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to isolated systems with no critical data access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access, not remotely exploitable.
🏢 Internal Only: HIGH - Local attackers (including malware or malicious insiders) can exploit this to gain elevated privileges on affected Apple devices within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some user interaction or existing limited privileges. Apple has addressed the logic issues that enabled exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4, iPadOS 14.4

Vendor Advisory: https://support.apple.com/en-us/HT212146

Restart Required: Yes

Instructions:

1. Open System Preferences > Software Update on macOS or Settings > General > Software Update on iOS/iPadOS. 2. Download and install the latest security update. 3. Restart the device when prompted.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and remote local access to affected devices through access controls and network segmentation.

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit what local users can do even with elevated access
  • Isolate affected systems in segmented network zones and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check system version: On macOS, go to Apple menu > About This Mac. On iOS/iPadOS, go to Settings > General > About. Compare with patched versions listed in affected_systems.versions.

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version

Verify Fix Applied:

Verify system version is equal to or newer than the patched versions listed in fix_official.patch_version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in system logs
  • Processes running with unexpected user/group IDs
  • Authentication log anomalies for local users

Network Indicators:

  • Unusual outbound connections from Apple devices following local user activity
  • Lateral movement attempts from Apple devices

SIEM Query:

source="apple_system_logs" AND (event_type="privilege_escalation" OR user_change="root" OR process_elevation="true")

🔗 References

📤 Share & Export