CVE-2021-30764

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution when processing maliciously crafted files on Apple devices. It affects iOS, iPadOS, watchOS, and tvOS systems before specific patched versions. Attackers could exploit this to run unauthorized code on affected devices.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • watchOS
  • tvOS
Versions: Versions before iOS 14.5, iPadOS 14.5, watchOS 7.4, tvOS 14.5
Operating Systems: iOS, iPadOS, watchOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable; exploitation requires processing malicious files

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing data theft, surveillance, or ransomware deployment

🟠

Likely Case

Malware installation leading to data exfiltration or credential theft

🟢

If Mitigated

Limited impact with proper network segmentation and file validation

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to process malicious files; no public exploit code available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 14.5, iPadOS 14.5, watchOS 7.4, tvOS 14.5

Vendor Advisory: https://support.apple.com/en-us/HT212317

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Download and install available update. 5. Restart device when prompted.

🔧 Temporary Workarounds

Disable automatic file processing

all

Prevent automatic opening of unknown file types

Restrict file sources

all

Only allow files from trusted sources and applications

🧯 If You Can't Patch

  • Implement strict file validation controls for all incoming files
  • Isolate vulnerable devices from critical network segments

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Version

Check Version:

Settings > General > About > Version

Verify Fix Applied:

Confirm version is iOS 14.5+, iPadOS 14.5+, watchOS 7.4+, or tvOS 14.5+

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file processing errors
  • Crash reports from file handling services

Network Indicators:

  • Unusual outbound connections after file processing

SIEM Query:

Search for file processing errors or crashes in Apple device logs

🔗 References

📤 Share & Export