Vulnerability identifier: #VU61345
Vulnerability risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-22652
CWE-ID:
CWE-287
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Apple iOS
Operating systems & Components /
Operating system
iPadOS
Operating systems & Components /
Operating system
Vendor: Apple Inc.
Description
The vulnerability allows an attacker to bypass authentication process.
The vulnerability exists due to GSMA authentication panel is be presented on the lock screen. An attacker with physical access to device can view and modify the carrier account information and settings from the lock screen.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Apple iOS: 15.0 19A346 - 15.3.1 19D52
iPadOS: 15.0 19A346 - 15.3.1 19D52
External links
https://support.apple.com/en-us/HT213182
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.