CVE-2022-22675

7.8 HIGH

📋 TL;DR

CVE-2022-22675 is an out-of-bounds write vulnerability in Apple operating systems that allows an application to execute arbitrary code with kernel privileges. This vulnerability affects multiple Apple platforms including iOS, iPadOS, macOS, tvOS, and watchOS. Apple has reported that this issue may have been actively exploited in the wild.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions before tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1, and iPadOS 15.4.1
Operating Systems: Apple iOS, Apple iPadOS, Apple macOS, Apple tvOS, Apple watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard configurations of affected Apple devices are vulnerable. No special configuration required for exploitation.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level privileges, allowing attackers to install persistent malware, access all user data, bypass security controls, and maintain persistent access to the device.

🟠

Likely Case

Privilege escalation leading to data theft, surveillance capabilities, or installation of additional malicious payloads on compromised devices.

🟢

If Mitigated

Limited impact with proper network segmentation, endpoint protection, and user privilege restrictions, though kernel-level access remains highly dangerous.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Apple confirmed active exploitation in the wild. Exploitation requires an attacker to have initial access to execute malicious code on the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1, iPadOS 15.4.1

Vendor Advisory: https://support.apple.com/en-us/HT213219

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted.

🧯 If You Can't Patch

  • Implement strict application allowlisting to prevent unauthorized applications from executing
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Version. Compare against patched versions listed in Apple advisories.

Check Version:

On macOS: sw_vers -productVersion. On iOS/iPadOS: Check Settings > General > About > Version.

Verify Fix Applied:

Verify device shows patched version number after update installation and restart.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected kernel module loading
  • Privilege escalation events
  • Unusual process creation from userland to kernel space

Network Indicators:

  • Connections to known malicious C2 servers following privilege escalation

SIEM Query:

Process creation where parent process has low privileges and child process has SYSTEM/root privileges on Apple devices

🔗 References

📤 Share & Export