Another zero-day in Apple’s software (CVE-2021-30869) is being actively exploited by attackers, forcing the company to push out security updates for macOS Catalina and iOS 12.
About CVE-2021-30869
Flagged by researchers Erye Hernandez and Clément Lecigne of Google’s Threat Analysis Group and Ian Beer of Google Project Zero, the vulnerability is a type confusion issue found in XNU, the kernel of Apple’s macOS and iOS operating systems.
As usual, Apple did not share any details about the flaw, and said only that it allows a malicious application to execute arbitrary code with kernel privileges.
Another Google TAG threat analyst shared that CVE-2021-30869 is being exploited in conjunction with a previously known WebKit vulnerabilities, and said that more details will be released after 30 days.
The iOS 12.5.5 security update also contains fixes for CVE-2021-30860 – the “zero-click” iMessage vulnerability exploited to deliver spyware that was patched in newer versions of iOS ten days ago – and CVE-2021-30858 – an actively exploited RCE in WebKit.
Source: https://www.helpnetsecurity.com/2021/09/24/cve-2021-30869/?web_view=true