Vulnerability Description
A validation issue was addressed with improved input sanitization. This issue is fixed in tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted URL may lead to arbitrary javascript code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 14.4 |
| Apple | Iphone Os | < 14.4 |
| Apple | Tvos | < 14.4 |
| Apple | Watchos | < 7.3 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/HT212146Release NotesVendor Advisory
- https://support.apple.com/en-us/HT212148Release NotesVendor Advisory
- https://support.apple.com/en-us/HT212149Release NotesVendor Advisory
- https://support.apple.com/en-us/HT212146Release NotesVendor Advisory
- https://support.apple.com/en-us/HT212148Release NotesVendor Advisory
- https://support.apple.com/en-us/HT212149Release NotesVendor Advisory
FAQ
What is CVE-2021-1748?
CVE-2021-1748 is a vulnerability with a CVSS score of 8.8 (HIGH). A validation issue was addressed with improved input sanitization. This issue is fixed in tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted URL may lead to arbitrary j...
How severe is CVE-2021-1748?
CVE-2021-1748 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-1748?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Tvos, Apple Watchos.