OVERVIEW:
A vulnerability has been discovered in Apple Products, which could allow for arbitrary code execution if a user views a specially crafted web page.
Successful exploitation of this vulnerability could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.
THREAT INTELLIGENCE:
Apple is aware of a report that CVE-2022-22620 may have been actively exploited.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY:
A vulnerability has been discovered in Apple Products, which could allow for arbitrary code execution if a user views a specially crafted web page.
Successful exploitation of this vulnerability could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.
RECOMMENDATIONS:
We recommend the following actions be taken:
REFERENCES:
Apple:
https://support.apple.com/en-us/HT213091
https://support.apple.com/en-us/HT213092
https://support.apple.com/en-us/HT213093
Security Week:
https://www.securityweek.com/apple-says-webkit-zero-day-hitting-ios-macos-devices
Bleeping Computer:
https://www.bleepingcomputer.com/news/security/apple-patches-new-zero-day-exploited-to-hack-iphones-ipads-macs/
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620