On SEP 12th, tech giant Apple rolled out security updates for their iOS, iPadOS, and macOS platforms to protect your Apple devices from 14 0-day vulnerabilities in iOS, iPadOS, and macOS. Apple didn’t disclose the technical details about the flaws to avoid the exploitation of the vulnerabilities. Let’s explore what Apple has shared about the vulnerabilities in this post. Let’s start this post from listing the vulnerabilities.
Apple has shared a long list of 0-day vulnerabilities in iOS, iPadOS, and macOS.
Sl. No. | CVE ID | Affected OS | Description | Impact |
1 | CVE-2022-32854 | All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7. | This is an improper checks in Privacy preferences. | Possible to bypass Privacy preferences. |
2 | CVE-2022-32911 | All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | This is an improper memory handling issue in Kernel. | Possible to execute arbitrary code with kernel privileges. |
3 | CVE-2022-32864 | All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | This is an improper memory handling issue in Kernel. | Possible to disclose kernel memory. |
4 | CVE-2022-32917 | All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | This is an improper bound checks in Kernel.The flaw is actively being exploited in the wild. | Possible to execute arbitrary code with kernel privileges. |
5 | CVE-2022-32883 | All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | This is a logic restrictions issue in Maps. | Possible to read read sensitive location information. |
6 | CVE-2022-32908 | All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | This is a memory corruption issue in MediaLibrary. | Possible to elevate privileges. |
7 | CVE-2022-32795 | All versions prior viOS 15.7 and viPadOS 15.7. | This is a logic issue in Safari Extensions. | A website may be able to track users through Safari web extensions. |
8 | CVE-2022-32872 | All versions prior viOS 15.7 and viPadOS 15.7. | This is a logic issue in Shortcuts. | Possible to access photos from the lock screen. |
9 | CVE-2022-32886 | All versions prior viOS 15.7 and viPadOS 15.7. | A buffer overflow issue in WebKit. | Processing maliciously crafted web content may lead to arbitrary code execution. |
10 | CVE-2022-32912 | All versions prior viOS 15.7 and viPadOS 15.7. | An out-of-bounds read flaw in WebKit. | Processing maliciously crafted web content may lead to arbitrary code execution |
11 | CVE-2022-32902 | All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | A logic issue in ATS. | Possible to bypass Privacy preferences. |
12 | CVE-2022-32896 | All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | A runtime issue in iMovie. | A user may be able to view sensitive user information. |
13 | CVE-2022-32894 | All versions prior macOS Big Sur v11.7. | An out-of-bounds write issue in Kernel. The flaw is actively being exploited in the wild. | Possible to execute arbitrary code with kernel privileges. |
14 | CVE-2022-32900 | All versions prior macOS Big Sur v11.7.All versions prior macOS Monterey v16.6. | A logic issue in PackageKit. | An app may be able to gain elevated privileges. |
All iOS, iPadOS, and macOS platforms are vulnerable to these flaws. It is recommended to apply the patch to protect your Apple devices from 14 0-day vulnerabilities in iOS, iPadOS, and macOS.
Apple released security updates in that it says it has released iOS v15.7, iPadOS 15.7, and macOS Big Sur 11.7 and Monterey 12.6 to fix these flaws. We recommend all the users of iPhones, iPad, and MacBooks upgrade their OS to the latest release. Please visit the Apple security updates page to read information about all the recently released security updates.
Follow the procedure shone in this picture to update iOS and iPadOS:
Go to Settings > General > Software Update > Click on Download and Install Updates.
Source: Apple
Follow the procedure shone in this picture to update macOS:
Go to Apple menu in the corner of your screen then Click Software Update in the System Preferences window.
Source: Apple
We hope this post would help you know how to protect your Apple devices from 14 0-day vulnerabilities in iOS, iPadOS, and macOS. Please share this post if you find this interested. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.