CVE-2021-30851

8.8 HIGH

📋 TL;DR

CVE-2021-30851 is a memory corruption vulnerability in Apple's WebKit browser engine that could allow remote code execution when processing malicious web content. This affects users of Safari, iOS, iPadOS, tvOS, and watchOS. Attackers could exploit this by tricking users into visiting specially crafted websites.

💻 Affected Systems

Products:
  • Safari
  • iOS
  • iPadOS
  • tvOS
  • watchOS
Versions: Versions before Safari 15, iOS 15, iPadOS 15, tvOS 15, watchOS 8
Operating Systems: iOS, iPadOS, tvOS, watchOS, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability is in WebKit, which powers Safari and other Apple browsers.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining arbitrary code execution at the user's privilege level, potentially leading to data theft, ransomware deployment, or persistent access.

🟠

Likely Case

Browser compromise leading to session hijacking, credential theft, or installation of malware on the affected device.

🟢

If Mitigated

Limited impact with browser sandboxing potentially containing the exploit, though sandbox escapes are possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website). Public proof-of-concept exists in security mailing lists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Safari 15, iOS 15, iPadOS 15, tvOS 15, watchOS 8

Vendor Advisory: https://support.apple.com/en-us/HT212814

Restart Required: Yes

Instructions:

1. Update to Safari 15 on macOS. 2. Update iOS/iPadOS devices to version 15 or later. 3. Update tvOS to version 15 or later. 4. Update watchOS to version 8 or later. 5. Restart devices after update.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation, though this breaks most websites.

Safari > Preferences > Security > Uncheck 'Enable JavaScript'

Use Alternative Browser

all

Use a non-WebKit based browser until patches are applied.

🧯 If You Can't Patch

  • Implement network filtering to block known malicious domains and restrict web browsing to trusted sites only.
  • Use application whitelisting to prevent execution of unauthorized binaries that could be dropped by the exploit.

🔍 How to Verify

Check if Vulnerable:

Check Safari version: Safari > About Safari. For iOS/iPadOS: Settings > General > About > Version. For tvOS: Settings > General > About > Version. For watchOS: iPhone Watch app > General > About > Version.

Check Version:

Safari: Not applicable via command line. iOS: Not applicable via command line. Use GUI methods above.

Verify Fix Applied:

Confirm version is Safari 15+, iOS 15+, iPadOS 15+, tvOS 15+, or watchOS 8+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual browser crashes, unexpected process creation from browser processes, suspicious network connections from browser to unknown domains

Network Indicators:

  • Traffic to known exploit domains, unusual outbound connections following web browsing

SIEM Query:

source="browser_logs" AND (event="crash" OR process="unexpected_child") OR dest_ip IN (malicious_ip_list)

🔗 References

📤 Share & Export