


The exploitation doesn’t need any form of authentication. A single authentication is required for exploitation.ĬVE-2021-30889: Due to a vulnerability in the WebKit component of Apple tvOS, processing maliciously crafted web content may lead to arbitrary code execution. As previously discussed here.ĬVE-2021-30886: Due to a vulnerability in the kernel component of Apple tvOS (Digital Media Player), an application may be able to execute arbitrary code with kernel privileges. This issue may have been actively exploited.

It demands that the victim is doing some kind of user interaction.ĬVE-2021-30883: Due to a vulnerability in the IOMobileFrameBuffer component of Apple tvOS, an application may be able to execute arbitrary code with kernel privileges. No form of authentication is needed for a successful exploitation. Arbitrary code executionĬVE-2021-30881: Due to a vulnerability in the FileProvider component of watchOS, unpacking a maliciously crafted archive may lead to arbitrary code execution. A single authentication is needed for exploitation. A simple authentication is needed for exploitation.ĬVE-2021-30907: Due to a vulnerability in the Audio component of watchOS, a malicious application may be able to elevate privileges. Elevation of privilegesĬVE-2021-30906: Due to a vulnerability in the iCloud component of watchOS, a local attacker may be able to elevate their privileges. VersionĪpple is, for understandable reasons, always a bit secretive about what was fixed, but from what we were able to figure out, these are the most worrying ones by type of vulnerability. As you can see in the table below, some patches are specific for 14.8.1 and some are specific for 15.1, while many are shared between them. Now the differences are starting to show. This update also came as a sort of surprise as it was not beta-tested beforehand.Įarlier this year Apple announced that users would have a choice between updating to iOS 15 as soon as it’s released, or staying on iOS 14 but still receiving important security updates. iOS 14.8.1 comes just a month after releasing iOS 14.8 for those who didn’t want to update their iPhones to iOS 15. On two consecutive days Apple has released a few important patches.
