CVE-2021-30856

9.1 CRITICAL

📋 TL;DR

This macOS vulnerability allows malicious unsandboxed applications to bypass Privacy preferences when Remote Login is enabled. Attackers could gain unauthorized access to protected data. Affects macOS Big Sur systems with Remote Login enabled.

💻 Affected Systems

Products:
  • macOS
Versions: macOS Big Sur versions prior to 11.3
Operating Systems: macOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Remote Login is enabled and malicious unsandboxed app is present on the system.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with unauthorized access to all protected data including keychain, files, and system resources.

🟠

Likely Case

Unauthorized access to sensitive user data and system files that should be protected by Privacy preferences.

🟢

If Mitigated

Limited impact if Remote Login is disabled or proper application sandboxing is enforced.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access with ability to run unsandboxed malicious application and Remote Login enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Big Sur 11.3 and later

Vendor Advisory: https://support.apple.com/en-us/HT212325

Restart Required: Yes

Instructions:

1. Open System Preferences > Software Update. 2. Install macOS Big Sur 11.3 or later. 3. Restart the system when prompted.

🔧 Temporary Workarounds

Disable Remote Login

all

Turn off Remote Login to prevent exploitation

sudo systemsetup -setremotelogin off

Enable Application Sandboxing

all

Ensure all applications run with proper sandboxing

🧯 If You Can't Patch

  • Disable Remote Login immediately via System Preferences > Sharing
  • Implement strict application control policies to prevent unsandboxed apps

🔍 How to Verify

Check if Vulnerable:

Check macOS version with 'sw_vers' and verify Remote Login status with 'sudo systemsetup -getremotelogin'

Check Version:

sw_vers

Verify Fix Applied:

Confirm macOS version is 11.3 or higher and check that Full Disk Access for SSH is properly configured

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized SSH connection attempts
  • Unexpected Full Disk Access requests
  • System logs showing privacy preference bypass

Network Indicators:

  • Unexpected SSH traffic from localhost
  • SSH connections to unusual ports

SIEM Query:

source="system.log" AND ("Remote Login" OR "ssh" OR "privacy bypass")

🔗 References

📤 Share & Export