CVE-2021-30945

7.8 HIGH

📋 TL;DR

This is a local privilege escalation vulnerability in Apple operating systems that allows an attacker with existing local access to gain elevated privileges. It affects macOS, iOS, iPadOS, tvOS, and watchOS users running outdated versions. The vulnerability was addressed through improved security checks in Apple's software updates.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
  • tvOS
  • watchOS
Versions: Versions prior to macOS Big Sur 11.6.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2, iPadOS 15.2, tvOS 15.2, watchOS 8.3
Operating Systems: Apple operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable; no specific settings are required for exploitation.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains root or system-level privileges, enabling complete compromise of the device, data theft, installation of persistent malware, or bypassing security controls.

🟠

Likely Case

A local user or malware escalates privileges to perform unauthorized actions, such as accessing sensitive files or modifying system settings.

🟢

If Mitigated

With proper patching, the risk is eliminated; without patching, impact is limited to attackers with initial local access, assuming other security controls like least privilege are enforced.

🌐 Internet-Facing: LOW, as this is a local vulnerability requiring prior access to the system, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM, as internal attackers or malware with local access could exploit it to escalate privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: UNKNOWN

Exploitation requires local access; no public proof-of-concept or weaponization details are available from the provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2, iPadOS 15.2, watchOS 8.3

Vendor Advisory: https://support.apple.com/en-us/HT212975

Restart Required: Yes

Instructions:

1. Go to System Preferences > Software Update on macOS or Settings > General > Software Update on iOS/iPadOS/tvOS/watchOS. 2. Install the available update. 3. Restart the device as prompted.

🧯 If You Can't Patch

  • Restrict local access to affected systems by enforcing strong authentication and least privilege principles.
  • Monitor for unusual privilege escalation activities using security tools and logs.

🔍 How to Verify

Check if Vulnerable:

Check the current OS version against the patched versions listed in the fix_official section.

Check Version:

On macOS: sw_vers -productVersion; On iOS/iPadOS: Settings > General > About > Version; On tvOS: Settings > General > About > Version; On watchOS: Settings > General > About > Version

Verify Fix Applied:

Confirm the OS version matches or exceeds the patched versions after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Look for unexpected privilege escalation events in system logs, such as sudo or su commands from unauthorized users.

Network Indicators:

  • Not applicable, as this is a local vulnerability with no direct network indicators.

SIEM Query:

Example: search for 'privilege escalation' or 'root access' events in Apple system logs, but specific queries depend on the SIEM and logging configuration.

🔗 References

📤 Share & Export