SB2022031436 - Multiple vulnerabilities in Apple iOS and iPadOS



SB2022031436 - Multiple vulnerabilities in Apple iOS and iPadOS

Published: March 14, 2022 Updated: March 20, 2023

Security Bulletin ID SB2022031436
Severity
High
Patch available
YES
Number of vulnerabilities 44
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 9% Low 66%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 44 secuirty vulnerabilities.


1) State Issues (CVE-ID: CVE-2022-22639)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a state management issue within the SoftwareUpdate subsystem. A malicious application can execute arbitrary code with elevated privileges.


2) Information disclosure (CVE-ID: CVE-2022-22622)

The vulnerability allows an attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output via keyboard suggestions in Markup. An attacker with physical access to device can gain access to sensitive information.


3) Improper access control (CVE-ID: CVE-2022-22670)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in MediaRemote. A local application can bypass implemented security restrictions and identify other installed applications on the device.


4) Information disclosure (CVE-ID: CVE-2022-22659)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in NetworkExtension. An attacker on the local network can gain access to sensitive user information.


5) Improper Authentication (CVE-ID: CVE-2022-22618)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to an unspecified error. An attacker with physical access to device can bypass the Emergency SOS passcode prompt.


6) Improper access control (CVE-ID: CVE-2022-22609)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Preferences feature. A malicious application can read other applications' settings.


7) Security restrictions bypass (CVE-ID: CVE-2022-22600)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to incorrect permissions logic in Sandbox. A malicious application can bypass certain Privacy preferences.


8) Security restrictions bypass (CVE-ID: CVE-2022-22599)

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to an error in Siri. An attacker with physical access to device can use Siri to obtain some location information from the lock screen.


9) Information disclosure (CVE-ID: CVE-2022-22621)

The vulnerability allows an attacker to gain access to potentially sensitive information.

The vulnerability exists due to sensitive information disclosure via keyboard suggestions. An attacker with physical access to the system can gain access to sensitive information.


10) NULL pointer dereference (CVE-ID: CVE-2022-22638)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in macOS kernel. A local user can run a specially crafted program and perform a denial of service (DoS) attack.


11) Improper Authentication (CVE-ID: CVE-2022-22671)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to improper authentication within the VoiceOver feature. An attacker with physical access to device can access photos from the lock screen.


12) Information disclosure (CVE-ID: CVE-2022-22662)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a cookie management issue in WebKit. A remote attacker can trick the victim to open a specially crafted webpage and gain access to sensitive information.


13) Buffer overflow (CVE-ID: CVE-2022-22610)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Use-after-free (CVE-ID: CVE-2022-22624)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


15) Use-after-free (CVE-ID: CVE-2022-22628)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


16) Heap-based buffer overflow (CVE-ID: CVE-2022-22629)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content within the WebGLMultiDraw component. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


17) Origin validation error (CVE-ID: CVE-2022-22637)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a logic error in WebKit. A remote attacker can trick the victim to visit a specially crafted website and cause unexpected cross-origin behavior.


18) Information disclosure (CVE-ID: CVE-2022-22668)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to logic issue within the Wi-Fi component. A malicious application can leak sensitive user information.


19) Use-after-free (CVE-ID: CVE-2021-36976)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in copy_string. A remote attacker can cause a denial of service condition on the target system.


20) Security restrictions bypass (CVE-ID: CVE-2022-22632)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper state management in macOS kernel. A local user can execute arbitrary code with elevated privileges.


21) Buffer overflow (CVE-ID: CVE-2022-22633)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files within Accelerate Framework. A remote attacker can create a specially crafted PDF, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


22) Security restrictions bypass (CVE-ID: CVE-2022-22643)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists in FaceTime due to the ability to send audio and video files without knowledge of the user. An attacker with physical access to the system can share sensitive information via FaceTime.


23) Buffer overflow (CVE-ID: CVE-2022-22666)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing image files in AppleAVD. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


24) Buffer overflow (CVE-ID: CVE-2022-22634)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within AVEVideoEncoder. A malicious application can execute arbitrary code on the system with kernel privileges.


25) Out-of-bounds write (CVE-ID: CVE-2022-22635)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within AVEVideoEncoder. A malicious application can execute arbitrary code on the system with kernel privileges.


26) Out-of-bounds write (CVE-ID: CVE-2022-22636)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within AVEVideoEncoder. A malicious application can execute arbitrary code on the system with kernel privileges.


27) Improper Authentication (CVE-ID: CVE-2022-22652)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to GSMA authentication panel is be presented on the lock screen. An attacker with physical access to device can view and modify the carrier account information and settings from the lock screen.


28) Improper access control (CVE-ID: CVE-2022-22598)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists in CoreMedia feature. A local application is able to learn information about the current camera view before being granted camera access.


29) Improper Authentication (CVE-ID: CVE-2022-22642)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to an error in FaceTime. An attacker can bypass Emergency SOS passcode prompt.


30) Use-after-free (CVE-ID: CVE-2022-22667)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in GPU drivers. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.



31) Use-after-free (CVE-ID: CVE-2022-22615)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A malicious application can trigger a use-after-free error and execute arbitrary code with kernel privileges.

32) Out-of-bounds read (CVE-ID: CVE-2022-22611)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and execute arbitrary code on the system.


33) Heap-based buffer overflow (CVE-ID: CVE-2022-22612)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in ImageIO. A remote attacker can trick the victim to open a specially crafted file, trigger a heap corruption and perform a denial of service (DoS) attack.


34) Use-after-free (CVE-ID: CVE-2022-22641)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in IOGPUFamily component. A malicious application can trigger a use-after-free error and execute arbitrary code on the system with elevated privileges.


35) Information disclosure (CVE-ID: CVE-2022-22653)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists within the iTunes component. A remote attacker can use a specially crafted website to access information about the user and their devices.


36) Buffer overflow (CVE-ID: CVE-2022-22596)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system.

37) Buffer overflow (CVE-ID: CVE-2022-22640)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system.


38) Out-of-bounds write (CVE-ID: CVE-2022-22613)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A malicious application can trigger an out-of-bounds write error and execute arbitrary code with kernel privileges.


39) Use-after-free (CVE-ID: CVE-2022-22614)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A malicious application can trigger a use-after-free error and execute arbitrary code with kernel privileges.

40) Security features bypass (CVE-ID: CVE-2022-22655)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to an error within the sandbox implementation. A local application can obtain sensitive user information.


41) Security restrictions bypass (CVE-ID: CVE-2021-30946)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in the Sandbox feature. A malicious application can bypass certain Privacy preferences.


42) Race condition (CVE-ID: CVE-2022-21658)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to a race condition in std::fs::remove_dir_all. A remote attacker can exploit the race, escalate privileges and delete arbitrary files on the system.


43) Security restrictions bypass (CVE-ID: CVE-2022-22663)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper securi5ty checks in the CoreTypes subsystem. A local application can bypass Gatekeeper checks.


44) Buffer overflow (CVE-ID: CVE-2022-22672)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the MobileAccessoryUpdater component. A malicious application can trigger memory corruption and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.