CVE-2021-30881

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution when processing malicious archive files on Apple devices. Attackers can exploit this by tricking users into opening specially crafted archives, potentially gaining full control of affected systems. All users running vulnerable versions of iOS, iPadOS, macOS, tvOS, and watchOS are affected.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions before iOS 15.1, iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1
Operating Systems: Apple iOS, Apple iPadOS, Apple macOS, Apple tvOS, Apple watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Archive processing is a core system function.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root privileges, data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Malware installation leading to credential theft, surveillance, or data exfiltration when users open malicious archives from untrusted sources.

🟢

If Mitigated

Limited impact with proper patch management and user education preventing archive execution from untrusted sources.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious archives, but could be delivered via email, downloads, or messaging apps.
🏢 Internal Only: LOW - Primarily requires user interaction with malicious files, though could be exploited via internal file shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious archive. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 15.1, iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1

Vendor Advisory: https://support.apple.com/en-us/HT212867

Restart Required: Yes

Instructions:

1. Open Settings/System Preferences 2. Navigate to Software Update 3. Download and install the latest update 4. Restart device when prompted

🔧 Temporary Workarounds

Disable automatic archive extraction

all

Configure systems to not automatically extract archives from untrusted sources

User education and policy

all

Train users to avoid opening archives from unknown sources and implement policies restricting archive execution

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized applications
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious archive processing behavior

🔍 How to Verify

Check if Vulnerable:

Check current OS version against affected versions list. On macOS: System Preferences > About This Mac. On iOS/iPadOS: Settings > General > About.

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version

Verify Fix Applied:

Verify OS version matches or exceeds patched versions listed in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual archive extraction processes
  • Suspicious child processes spawned from archive utilities
  • Failed archive processing attempts

Network Indicators:

  • Downloads of archive files from suspicious sources
  • Outbound connections following archive processing

SIEM Query:

process_name:"unzip" OR process_name:"tar" OR process_name:"Archive Utility" AND (process_child_count > 5 OR process_path contains suspicious)

🔗 References

📤 Share & Export