CVE-2021-1847

7.8 HIGH

📋 TL;DR

This is a memory corruption vulnerability in macOS that allows arbitrary code execution when opening malicious files. It affects macOS Big Sur, Catalina, and Mojave systems. Attackers can exploit this to crash applications or take control of affected systems.

💻 Affected Systems

Products:
  • macOS
Versions: macOS Big Sur prior to 11.3, macOS Catalina prior to Security Update 2021-002, macOS Mojave prior to Security Update 2021-003
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root privileges and persistent access to the system.

🟠

Likely Case

Application crashes leading to denial of service, with potential for limited code execution in user context.

🟢

If Mitigated

No impact if systems are fully patched and users avoid opening untrusted files.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via web downloads or email attachments.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files, but requires social engineering.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious files. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Big Sur 11.3, Security Update 2021-002 Catalina, Security Update 2021-003 Mojave

Vendor Advisory: https://support.apple.com/en-us/HT212325

Restart Required: Yes

Instructions:

1. Open System Preferences > Software Update. 2. Install available updates. 3. Restart system when prompted.

🔧 Temporary Workarounds

Restrict file execution

all

Use application whitelisting to prevent execution of untrusted applications

sudo spctl --master-enable
sudo spctl --enable --label "Developer ID"

User education

all

Train users to avoid opening files from untrusted sources

🧯 If You Can't Patch

  • Implement application control/whitelisting to restrict which applications can run
  • Use endpoint detection and response (EDR) tools to monitor for suspicious file execution

🔍 How to Verify

Check if Vulnerable:

Check macOS version: sw_vers -productVersion

Check Version:

sw_vers -productVersion

Verify Fix Applied:

Verify version is at least: Big Sur 11.3, Catalina with Security Update 2021-002, Mojave with Security Update 2021-003

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Console logs
  • Unexpected file opening events
  • Process creation from suspicious file types

Network Indicators:

  • Downloads of suspicious file types from untrusted sources

SIEM Query:

source="macos" AND (event="application_crash" OR event="file_open") AND file_extension IN ("dmg", "pkg", "app", "zip")

🔗 References

📤 Share & Export