Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

ITS ADVISORY NUMBER: 

2021-116

DATE(S) ISSUED: 

Tuesday, September 21, 2021

SUBJECT: 

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

OVERVIEW: 

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.

  • iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.
  • iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.
  • Safari is a graphical web browser developed by Apple, based on the WebKit engine.
  • watchOS is the mobile operating system for Apple Watch and is based on the iOS operating system.
  • tvOS is an operating system for fourth-generation Apple TV digital media player.
  • Xcode is an integrated development environment (IDE) for macOS.
  • iTunes for Windows is a media player, media library, Internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store.

Successful exploitation of the most severe of these vulnerabilities could result in arbitrary code execution in the context of the affected user.

THREAT INTELLIGENCE:

There are no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED: 

  • iOS prior to 15.0
  • iPadOS prior to 15.0
  • watchOS prior to 8.0
  • tvOS prior to 15.0
  • Xcode prior to 13.0
  • Safari prior to 15.0
  • iTunes for Windows prior to 12.12

RISK:

Government:

Large and medium government entities: High

Small government entities: Medium

Business:

Large and medium business entities: High

Small business entities: Medium

Home Users: Low

 

DESCRIPTION: 

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution in the context of the affected user. Details of these vulnerabilities are as follows:

iOS 15 and iPadOS 15:

  • An application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30837)
  • A local attacker may be able to read sensitive information. (CVE-2021-30811)
  • A malicious application may be able to execute arbitrary code with system privileges on devices with an Apple Neural Engine (CVE-2021-30838)
  • A local attacker may be able to cause unexpected application termination or arbitrary code execution. (CVE-2021-30825)
  • A 3D model constructed to look like the enrolled user may be able to authenticate via Face ID. (CVE-2021-30863)
  • a maliciously crafted dfont file may lead to arbitrary code execution. (CVE-2021-30841, CVE-2021-30842, CVE-2021-30843)
  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • A malicious application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30857)
  • A remote attacker may be able to cause a denial of service. (CVE-2013-0340)
  • Processing a maliciously crafted USD file may disclose memory contents. (CVE-2021-30819)
  • An application may be able to access restricted files. (CVE-2021-30855)
  • A sandboxed process may be able to circumvent sandbox restrictions. (CVE-2021-30854)
  • A local attacker may be able to view contacts from the lock screen. (CVE-2021-30815)
  • In certain situations, the baseband would fail to enable integrity and ciphering protection. (CVE-2021-30826)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30848, CVE-2021-30851)
  • An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup. (CVE-2021-30810)

 

watchOS 8:

  • An application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30837)
  • A local attacker may be able to read sensitive information. (CVE-2021-30811)
  • Processing a maliciously crafted dfont file may lead to arbitrary code execution. (CVE-2021-30841, CVE-2021-30842, CVE-2021-30843)
  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • A malicious application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30857)
  • A remote attacker may be able to cause a denial of service. (CVE-2013-0340)
  • An application may be able to access restricted files. (CVE-2021-30855)
  • A sandboxed process may be able to circumvent sandbox restrictions. (CVE-2021-30854)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30851)
  • An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup. (CVE-2021-30810)

 

tvOS 15:

  • An application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30837)
  • Processing a maliciously crafted dfont file may lead to arbitrary code execution. (CVE-2021-30841, CVE-2021-30842, CVE-2021-30843)
  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • A malicious application may be able to execute arbitrary code with kernel privileges. (CVE-2021-30857)
  • A remote attacker may be able to cause a denial of service. (CVE-2013-0340)
  • A sandboxed process may be able to circumvent sandbox restrictions. (CVE-2021-30854)
  • A user may gain access to protected parts of the file system. (CVE-2021-30850)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30851)
  • An attacker in physical proximity may be able to force a user onto a malicious Wi-Fi network during device setup. (CVE-2021-30810)

 

Xcode 13:

  • Multiple issues in nginx (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747, CVE-2017-7529, CVE-2018-16843, CVE-2018-16844, CVE-2018-16845, CVE-2019-20372)

 

Safari 15:

  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)
  • Processing maliciously crafted web content may lead to code execution. (CVE-2021-30849, CVE-2021-30851) 

iTunes 12.12 for Windows:

  • Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2021-30835, CVE-2021-30847)
  • Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846, CVE-2021-30849)

Successful exploitation of the most severe of these vulnerabilities could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.

ACTIONS: 

  • After appropriate testing, immediately apply patches provided by Apple to vulnerable system.
  • Run all software as a nonprivileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to download, accept or execute files from untrusted and unknown sources.
  • Remind users not to visit untrusted websites or follow links provided by untrusted or unknown sources.
  • Evaluate read, write, and execute permissions on all newly installed software.
  • Apply the Principle of Least Privilege to all systems and services.

REFERENCES: 

Apple:
https://support.apple.com/en-us/HT212814
https://support.apple.com/en-us/HT212815
https://support.apple.com/en-us/HT212816
https://support.apple.com/en-us/HT212817
https://support.apple.com/en-us/HT212818
https://support.apple.com/en-us/HT212819

CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30863