CVE-2022-22643

7.5 HIGH

📋 TL;DR

CVE-2022-22643 is a FaceTime vulnerability that allows an attacker to initiate audio/video transmission without the user's consent or awareness. This affects Apple users on vulnerable iOS, iPadOS, and macOS versions. The vulnerability enables unauthorized media capture during FaceTime calls.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
Versions: Versions before iOS 15.4, iPadOS 15.4, and macOS Monterey 12.3
Operating Systems: iOS, iPadOS, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all devices with FaceTime capability running vulnerable versions. No special configuration required.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of audio/video privacy during FaceTime calls, enabling covert surveillance and recording of sensitive conversations or environments.

🟠

Likely Case

Unauthorized audio/video transmission during FaceTime calls without user notification, potentially capturing private conversations or surroundings.

🟢

If Mitigated

No impact if patched; limited to FaceTime calls only, not affecting other applications or system functions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires FaceTime call initiation; exploitation details not publicly documented. Apple addressed through improved checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 15.4, iPadOS 15.4, macOS Monterey 12.3

Vendor Advisory: https://support.apple.com/en-us/HT213182

Restart Required: Yes

Instructions:

1. Open Settings > General > Software Update. 2. Download and install iOS 15.4/iPadOS 15.4. 3. For macOS: Apple menu > System Preferences > Software Update. 4. Install macOS Monterey 12.3. 5. Restart device after installation.

🔧 Temporary Workarounds

Disable FaceTime

all

Temporarily disable FaceTime to prevent exploitation until patching is possible.

iOS/iPadOS: Settings > FaceTime > Toggle off
macOS: FaceTime app > Preferences > Turn FaceTime Off

🧯 If You Can't Patch

  • Disable FaceTime completely in device settings
  • Use alternative video conferencing applications instead of FaceTime

🔍 How to Verify

Check if Vulnerable:

Check device version: iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version.

Check Version:

iOS/iPadOS: Settings > General > About > Version. macOS: sw_vers

Verify Fix Applied:

Confirm version is iOS 15.4+, iPadOS 15.4+, or macOS Monterey 12.3+.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected FaceTime call initiation logs
  • Audio/video permission alerts without user interaction

Network Indicators:

  • Unexpected FaceTime network traffic without user initiation

SIEM Query:

Not applicable - client-side application vulnerability with no server-side logging.

🔗 References

📤 Share & Export