CVE-2021-30675

7.8 HIGH

📋 TL;DR

CVE-2021-30675 is a memory corruption vulnerability in Apple's Boot Camp software that allows a malicious application to elevate privileges. This affects users running Boot Camp on macOS systems with Intel processors. Successful exploitation could give an attacker higher system privileges than intended.

💻 Affected Systems

Products:
  • Apple Boot Camp
Versions: Versions prior to 6.1.14
Operating Systems: macOS with Intel processors
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Boot Camp Assistant for Windows installation on Intel-based Macs. Apple Silicon (M1/M2) Macs are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full system control through privilege escalation, potentially installing persistent malware, accessing sensitive data, or compromising the entire system.

🟠

Likely Case

Local attackers with limited privileges could elevate to administrative or system-level access to bypass security controls.

🟢

If Mitigated

With proper patch management and least privilege principles, the impact is limited to isolated systems where exploitation requires local access.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access or malware execution.
🏢 Internal Only: MEDIUM - Internal attackers or malware with local execution could exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to execute malicious code. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Boot Camp 6.1.14

Vendor Advisory: https://support.apple.com/en-us/HT212517

Restart Required: Yes

Instructions:

1. Open System Preferences > Software Update. 2. Install all available updates. 3. Restart your Mac. 4. Verify Boot Camp version is 6.1.14 or later.

🔧 Temporary Workarounds

Disable Boot Camp if not needed

all

Remove or disable Boot Camp Assistant if Windows dual-boot functionality is not required

Restrict local user privileges

all

Implement least privilege by restricting standard users from installing or running untrusted applications

🧯 If You Can't Patch

  • Implement application allowlisting to prevent execution of unauthorized applications
  • Use endpoint detection and response (EDR) solutions to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Boot Camp version in System Information > Software > Boot Camp. If version is earlier than 6.1.14, system is vulnerable.

Check Version:

system_profiler SPSoftwareDataType | grep 'Boot Camp'

Verify Fix Applied:

Confirm Boot Camp version is 6.1.14 or later in System Information.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Suspicious Boot Camp process behavior
  • Unauthorized access to system directories

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process where (parent_process_name contains 'Boot Camp' OR process_name contains 'Boot Camp') AND (integrity_level changed OR privileges escalated)

🔗 References

📤 Share & Export