OVERVIEW:
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for local code execution. Successful exploitation of the most severe vulnerability could allow an attacker to execute code in the context of the kernel. Malicious actors with administrative access may be able to install programs; view, change, or delete data; or create new accounts with full user rights.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICALSUMMARY:
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for local code execution. Successful exploitation of the most severe vulnerability could allow an attacker to execute code in the context of the kernel. Details of these vulnerabilities are as follows:
Malicious actors with administrative access may be able to install programs; view, change, or delete data; or create new accounts with full user rights.
RECOMMENDATIONS:
We recommend the following actions be taken:
Apply the Principle of Least Privilege to all systems and services.
REFERENCES:
Apple:https://support.apple.com/en-us/HT213220https://support.apple.com/en-us/HT213219
CVE:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22674