CVE-2022-22643
📋 TL;DR
CVE-2022-22643 is a FaceTime vulnerability that allows an attacker to initiate audio/video transmission without the user's consent or awareness. This affects Apple users on vulnerable iOS, iPadOS, and macOS versions. The vulnerability enables unauthorized media capture during FaceTime calls.
💻 Affected Systems
- iOS
- iPadOS
- macOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Complete loss of audio/video privacy during FaceTime calls, enabling covert surveillance and recording of sensitive conversations or environments.
Likely Case
Unauthorized audio/video transmission during FaceTime calls without user notification, potentially capturing private conversations or surroundings.
If Mitigated
No impact if patched; limited to FaceTime calls only, not affecting other applications or system functions.
🎯 Exploit Status
Requires FaceTime call initiation; exploitation details not publicly documented. Apple addressed through improved checks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 15.4, iPadOS 15.4, macOS Monterey 12.3
Vendor Advisory: https://support.apple.com/en-us/HT213182
Restart Required: Yes
Instructions:
1. Open Settings > General > Software Update. 2. Download and install iOS 15.4/iPadOS 15.4. 3. For macOS: Apple menu > System Preferences > Software Update. 4. Install macOS Monterey 12.3. 5. Restart device after installation.
🔧 Temporary Workarounds
Disable FaceTime
allTemporarily disable FaceTime to prevent exploitation until patching is possible.
iOS/iPadOS: Settings > FaceTime > Toggle off
macOS: FaceTime app > Preferences > Turn FaceTime Off
🧯 If You Can't Patch
- Disable FaceTime completely in device settings
- Use alternative video conferencing applications instead of FaceTime
🔍 How to Verify
Check if Vulnerable:
Check device version: iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version.
Check Version:
iOS/iPadOS: Settings > General > About > Version. macOS: sw_vers
Verify Fix Applied:
Confirm version is iOS 15.4+, iPadOS 15.4+, or macOS Monterey 12.3+.
📡 Detection & Monitoring
Log Indicators:
- Unexpected FaceTime call initiation logs
- Audio/video permission alerts without user interaction
Network Indicators:
- Unexpected FaceTime network traffic without user initiation
SIEM Query:
Not applicable - client-side application vulnerability with no server-side logging.