--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Multiple Zero-Day Vulnerabilities in Apple Products' version: '1.0' number: '2021-049' date: 'September 14, 2021' --- _History:_ * _14/09/2021 --- v1.0 -- Initial publication_ # Summary On September 13, Apple has released multiple security updates to address two zero-day vulnerabilities tracked as CVE-2021-30858 and CVE-2021-30860 in multiple products [1]. An attacker could exploit these vulnerabilities to take control of an affected device [2]. One vulnerability is known to be used to install the Pegasus spyware on iPhones [3] and Apple is aware of a report that this issue may have been actively exploited [1]. # Technical Details Both vulnerabilities allow maliciously crafted documents to execute commands when opened on vulnerable devices. ## CVE-2021-30860 - CoreGraphics The CVE-2021-30860 CoreGraphics vulnerability is an integer overflow bug discovered by Citizen Lab that allows threat actors to create malicious PDF documents that execute commands when opened in iOS and macOS [3]. The exploit, which called `FORCEDENTRY`, targets Apple’s image rendering library, and was effective against Apple iOS, MacOS and WatchOS devices [4]. ## CVE-2021-30858 - WebKit The CVE-2021-30858 is a WebKit use after free vulnerability allowing hackers to create maliciously crafted web page that execute commands when visiting them on iPhones and macOS. Apple states that this vulnerability was disclosed anonymously [3]. # Products Affected The vulnerabilities affect: - iPhones with iOS versions prior to 14.8; - Mac computers with operating system versions prior to OSX Big Sur 11.6 and Catalina Security Update 2021-005; - Apple Watches prior to watchOS 7.6.2; - Safari with versions prior to 14.1.2. # Recommendations Apple has released software updates addressing the vulnerabilities [1]. CERT-EU recommends updating vulnerable software as soon as possible. # References [1] [2] [3] [4]