
Cloud Vulnerability DB
A community-led vulnerabilities database
A logic issue in macOS Big Sur's Kext Management component was discovered that could allow a local user to load unsigned kernel extensions. This vulnerability, tracked as CVE-2021-30680, was identified by Csaba Fitzl of Offensive Security and fixed in macOS Big Sur 11.4, which was released on May 24, 2021 (Apple Security).
The vulnerability was assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The issue stemmed from a logic flaw in the state management of the Kext Management component, which could potentially be exploited by a local user with limited privileges (NVD).
The vulnerability could allow a local user to bypass security controls and load unsigned kernel extensions into the system. This capability could potentially lead to privilege escalation and compromise the system's security model by allowing unauthorized kernel code execution (Apple Security).
Apple addressed this vulnerability by improving state management in the Kext Management component. The fix was included in macOS Big Sur 11.4. Users are advised to update their systems to this version or later to mitigate the vulnerability (Apple Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."