{"id":"CVE-2021-1870","details":"A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..","modified":"2026-04-16T04:37:15.267640943Z","published":"2021-04-02T19:15:20.567Z","related":["ALSA-2021:4381","SUSE-SU-2021:1430-1","SUSE-SU-2021:1499-1","SUSE-SU-2021:1990-1","openSUSE-SU-2021:0637-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-1870"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202104-03"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT212146"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT212147"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"14.4"}]},{"events":[{"introduced":"0"},{"fixed":"14.4"}]},{"events":[{"introduced":"10.15"},{"fixed":"10.15.7"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-security_update_2020\\-001"}]},{"events":[{"introduced":"0"},{"last_affected":"10.15.7-supplemental_update"}]},{"events":[{"introduced":"11.0.1"},{"fixed":"11.2"}]},{"events":[{"introduced":"0"},{"fixed":"2.30.6"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-1870.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}