Apple’s Zero-Day 0-Click Critical Vulnerability CVE-2022-22620


    CVE Trends was just warning us that over the past week the latest Apple vulnerability has racked up nearly 6 million audience interactions on Twitter.

    CVE-2022-22620: 6M
    CVE-2022-24086: 3.2M
    CVE-2021-44521: 2.9M

    Source: CVE Trends

    Very interesting to see such a long tail instead of the usual up and down audience curve.

    Apple, per usual, is very tight-lipped about their emergency security patch, which has been credited to an anonymous researcher.

    Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A use after free issue was addressed with improved memory management.

    Alleged so far is that this marks a 0-day in Apple devices (exploited in the wild before the patch was released), easily hacked by clicking on just one link (1-click) or perhaps even less (0-click through waterholing, XSS, MITM, captive portal, etc). It would be hard to allege anything higher risk.

    It’s surely safe to say that releasing a 15.3.1 just two weeks after they announced ten major security fixes in the 15.3 release (including in-the-wild 0-day patch of CVE-2022-22587 — code execution with kernel privileges) means this minor version patch is even more unusually important.

    Also worth noting is malware researchers pulling their “UPDATE NOW” alarm, and CISA saying “we’ve added one more” the next day after publishing their latest “Known Exploited Vulnerabilities Catalog”.

    …evidence that threat actors are actively exploiting the vulnerability… remediation due date: 2/25/2022 [only two weeks from Apple’s patch release]

    Highly unusual to have a critical patch announcement dropped almost immediately on top of a critical patch announcement. It doesn’t get any more serious than this one.

    As a laugh I also have to give credit where due, since The Register apparently published on this vulnerability all the waaaay back in 1970.

    Source: VulMon

    Leave it to a vulnerability reporting site to have an obvious integrity issue.

    And as another laugh, that Register article cites a ex-Google program manager for Microsoft throwing stones from inside his glass house

    Imagine, if you can, a world where installing an alternative browser as your default actually had a chance of protecting you from [a software company’s] shocking underinvestment in security

    Indeed. Chrome on Google and Edge on Microsoft should be your last choice, given what we know about WebKit on Apple having issues.





    Source link

    Previous articleHow the 'Big Short DAO' Bet Against the Crypto Market and Won – Coindesk
    Next articleAfter an Explosive Q4, What Could Possibly Stop Apple?