Apple released security updates for multiple products. The exploitation of some of these security flaws will allow an attacker to bypass many core Apple security mechanisms, crash the application, potentially control affected systems, and putting Mac users at great risk. A vulnerability management solution will help in mitigating this.
The updates for macOS include fixes for 64 vulnerabilities. Auto patching can fix all off these vulnerabilities. These flaws allow attackers to execute arbitrary code with kernel or system privileges, bypass privacy preferences, read restricted memory, cause unexpected application termination or heap corruption, disclose sensitive information, read arbitrary files, conduct cross-site scripting and phishing attacks, etc.
Zero-Day (CVE-2021-30657)
A critical zero-day vulnerability exploited in the wild by Shlayer malware is fixed in this April’s security update. The vulnerability allows an attacker to bypass core Apple security mechanisms such as Apple’s File Quarantine, Gatekeeper, and Notarization security checks. It also runs second-stage malicious payloads. The vulnerability is discovered and reported by Security researcher Cedric Owens.
Zero-Day (CVE-2021-30661)
Another critical zero-day vulnerability related to WebKit Storage is also being exploited in the wild. It impacts iOS and watchOS devices. The vulnerability allows an attacker to conduct remote code execution.
Apple Security Updates Summary for April 2021
macOS
- Affected OS: macOS Big Sur, Catalina, and Mojave
- Affected features: APFS, AppleMobileFileIntegrity, Apple Neural Engine, Archive Utility, Audio, CFNetwork, CoreAudio, CoreFoundation, CoreGraphics, CoreText, curl, DiskArbitration, FaceTime, FontParser, Foundation, Heimdal, ImageIO, Installer, Intel Graphics Driver, Kernel, libxpc, Login Window, Notes, Preferences, Safari, SampleAnalysis, smbx, System Preferences, tcpdump, Time Machine, WebKit, WebKit Storage, WebRTC, Wi-Fi, WindowServer, libxslt, NSRemoteView, Tailspin, wifivelocityd
- Impact: Information Disclosure, Privilege Escalation, Arbitrary code execution, Security Bypass, Memory Corruption, Cross-site scripting, File System Modification, Phishing
- CVEs: CVE-2020-27942, CVE-2020-3838, CVE-2020-7463, CVE-2020-8037, CVE-2020-8285, CVE-2020-8286, CVE-2021-1739, CVE-2021-1740, CVE-2021-1784, CVE-2021-1797, CVE-2021-1805, CVE-2021-1806, CVE-2021-1808, CVE-2021-1809, CVE-2021-1810, CVE-2021-1811, CVE-2021-1813, CVE-2021-1814, CVE-2021-1815, CVE-2021-1817, CVE-2021-1820, CVE-2021-1824, CVE-2021-1825, CVE-2021-1826, CVE-2021-1828, CVE-2021-1829, CVE-2021-1832, CVE-2021-1834, CVE-2021-1839, CVE-2021-1840, CVE-2021-1841, CVE-2021-1843, CVE-2021-1846, CVE-2021-1847, CVE-2021-1849, CVE-2021-1851, CVE-2021-1853, CVE-2021-1855, CVE-2021-1857, CVE-2021-1858, CVE-2021-1859, CVE-2021-1860, CVE-2021-1861, CVE-2021-1867, CVE-2021-1868, CVE-2021-1872, CVE-2021-1873, CVE-2021-1875, CVE-2021-1876, CVE-2021-1878, CVE-2021-1880, CVE-2021-1881, CVE-2021-1882, CVE-2021-1883, CVE-2021-1884, CVE-2021-1885, CVE-2021-30652, CVE-2021-30653, CVE-2021-30655, CVE-2021-30657, CVE-2021-30658, CVE-2021-30659, CVE-2021-30660, CVE-2021-30661
iOS and iPadOS
- Affected OS : iOS and iPadOS
- Affected Features: Accessibility, App Store, Apple Neural Engine, AppleMobileFileIntegrity, Assets, Audio, CFNetwork, CoreAudio, CoreFoundation, CoreText, FaceTime, FontParser, Foundation, GPU Drivers, Heimdal, ImageIO, iTunes Store, Kernel, libxpc, libxslt, MobileInstallation, Password Manager, Preferences, Safari, Shortcuts, Tailspin, Telephony, Wallet, WebKit, WebKit Storage, WebRTC
- Impact: Arbitrary Code Execution, Authentication Bypass, Information Disclosure, Memory Corruption, Cross-Site Scripting, File System Modification, Arbitrary File Read, Privilege Escalation
- CVEs : CVE-2020-7463, CVE-2021-1739, CVE-2021-1740, CVE-2021-1807, CVE-2021-1808, CVE-2021-1809, CVE-2021-1811, CVE-2021-1813, CVE-2021-1815, CVE-2021-1816, CVE-2021-1817, CVE-2021-1820, CVE-2021-1822, CVE-2021-1825, CVE-2021-1826, CVE-2021-1830, CVE-2021-1831, CVE-2021-1832, CVE-2021-1835, CVE-2021-1836, CVE-2021-1837, CVE-2021-1843, CVE-2021-1846, CVE-2021-1848, CVE-2021-1849, CVE-2021-1851, CVE-2021-1852, CVE-2021-1854, CVE-2021-1857, CVE-2021-1858, CVE-2021-1860, CVE-2021-1864, CVE-2021-1865, CVE-2021-1867, CVE-2021-1868, CVE-2021-1872, CVE-2021-1874, CVE-2021-1875, CVE-2021-1877, CVE-2021-1881, CVE-2021-1882, CVE-2021-1883, CVE-2021-1884, CVE-2021-1885, CVE-2021-30652, CVE-2021-30653, CVE-2021-30656, CVE-2021-30659, CVE-2021-30660, CVE-2021-30661
Xcode
- Affected OS: macOS Big Sur
- Affected features: Git
- Impact: Arbitrary Code Execution
- CVEs: CVE-2021-21300
iCloud
- Affected OS: Windows 10 and later
- Affected features: CFNetwork, CoreText, WebKit, WebRTC
- Impact: Information Disclosure, Cross-Site Scripting, Memory Corruption
- CVEs: CVE-2021-1857, CVE-2021-1811, CVE-2021-1825, CVE-2020-7463
- Affected OS: macOS Catalina and Mojave
- Affected features: WebRTC, WebKit
- Impact: Cross-Site Scripting, Memory Corruption
- CVEs: CVE-2021-1825, CVE-2020-7463
- Product: Apple TV 4K and Apple TV HD
- Affected features: AppleMobileFileIntegrity, Assets, Audio, CFNetwork, CoreAudio, CoreText, FontParser, Foundation, Heimdal, ImageIO, iTunes Store, Kernel, libxpc, libxslt, MobileInstallation, Preferences, Tailspin, WebKit, WebKit Storage
- Impact: Arbitrary Code Execution, Information Disclosure, Memory Corruption, Cross-Site Scripting, Elevation of Privilege, Denial of Service, File System Modification
- CVEs: CVE-2021-1739, CVE-2021-1740, CVE-2021-1808, CVE-2021-1809, CVE-2021-1811, CVE-2021-1813, CVE-2021-1815, CVE-2021-1816, CVE-2021-1817, CVE-2021-1820, CVE-2021-1822, CVE-2021-1825, CVE-2021-1826, CVE-2021-1832, CVE-2021-1836, CVE-2021-1843, CVE-2021-1844, CVE-2021-1846, CVE-2021-1849, CVE-2021-1851, CVE-2021-1857, CVE-2021-1858, CVE-2021-1860, CVE-2021-1864, CVE-2021-1868, CVE-2021-1875, CVE-2021-1881, CVE-2021-1882, CVE-2021-1883, CVE-2021-1884, CVE-2021-1885, CVE-2021-30652, CVE-2021-30653, CVE-2021-30660, CVE-2021-30661
- Product: Apple Watch
- Affected features: AppleMobileFileIntegrity, Audio, CFNetwork, CoreAudio, CoreFoundation, CoreText, FaceTime, FontParser, Foundation, Heimdal, ImageIO, iTunes Store, Kernel, libxpc, libxslt, MobileInstallation, Preferences, Safari, Tailspin, WebKit, WebKit Storage
- Impact: Code Execution, Information Disclosure, Memory Corruption, Cross-Site Scripting, Denial of Service, Elevation of Privilege
- CVEs: CVE-2021-1739, CVE-2021-1740, CVE-2021-1807, CVE-2021-1808, CVE-2021-1809, CVE-2021-1811, CVE-2021-1813, CVE-2021-1814, CVE-2021-1815, CVE-2021-1816, CVE-2021-1817, CVE-2021-1820, CVE-2021-1822, CVE-2021-1825, CVE-2021-1826, CVE-2021-1832, CVE-2021-1843, CVE-2021-1846, CVE-2021-1849, CVE-2021-1851, CVE-2021-1857, CVE-2021-1858, CVE-2021-1860, CVE-2021-1864, CVE-2021-1868, CVE-2021-1872, CVE-2021-1875, CVE-2021-1880, CVE-2021-1881, CVE-2021-1882, CVE-2021-1883, CVE-2021-1884, CVE-2021-1885, CVE-2021-30652, CVE-2021-30653, CVE-2021-30659, CVE-2021-30660, CVE-2021-30661
SanerNow detects these vulnerabilities and automatically fixes them by applying security updates. Use SanerNow to keep your systems updated and secure.