CVE-2021-30924
📋 TL;DR
This CVE describes a denial-of-service vulnerability in macOS that allows a remote attacker to cause affected devices to unexpectedly restart. The issue was fixed in macOS Monterey 12.0.1. All macOS systems running vulnerable versions are affected.
💻 Affected Systems
- macOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Persistent denial-of-service attacks causing repeated system restarts, disrupting business operations and potentially causing data loss or corruption.
Likely Case
Temporary service disruption with system restart, causing downtime for affected devices.
If Mitigated
Minimal impact with proper network segmentation and updated systems.
🎯 Exploit Status
Apple's description indicates remote exploitation is possible without authentication, suggesting relatively straightforward exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Monterey 12.0.1
Vendor Advisory: https://support.apple.com/en-us/HT212869
Restart Required: Yes
Instructions:
1. Open System Preferences > Software Update. 2. Install macOS Monterey 12.0.1 update. 3. Restart the system when prompted.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to vulnerable macOS systems to trusted networks only.
Firewall Rules
allImplement strict firewall rules to limit inbound connections to vulnerable systems.
🧯 If You Can't Patch
- Isolate vulnerable systems from untrusted networks and internet access.
- Implement network monitoring for unusual restart patterns or denial-of-service attempts.
🔍 How to Verify
Check if Vulnerable:
Check macOS version: if running macOS Monterey earlier than 12.0.1, the system is vulnerable.
Check Version:
sw_vers
Verify Fix Applied:
Verify macOS version is 12.0.1 or later via System Information or terminal command.
📡 Detection & Monitoring
Log Indicators:
- Unexpected system restarts in system logs
- Kernel panic logs
- Crash reports indicating abnormal termination
Network Indicators:
- Unusual network traffic patterns preceding system restarts
- Multiple connection attempts from single sources
SIEM Query:
source="macos_system_logs" AND (event="restart" OR event="shutdown") AND NOT user="root" AND NOT process="softwareupdated"
🔗 References
- https://support.apple.com/en-us/HT212869
- https://support.apple.com/kb/HT212867
- https://support.apple.com/kb/HT212874
- https://support.apple.com/kb/HT212876
- https://support.apple.com/en-us/HT212869
- https://support.apple.com/kb/HT212867
- https://support.apple.com/kb/HT212874
- https://support.apple.com/kb/HT212876