Lucene search

hiveproHive ProHIVEPRO:2A4C96F3CDC5144909A1C1EA5E182515
HistoryFeb 11, 2022 - 1:02 p.m.

Zero-day vulnerability in WebKit affects Apple macOS

Hive Pro

0.002 Low




THREAT LEVEL: Red. For a detailed advisory, download the pdf file here A third zero-day vulnerability has been identified since the latest zero-day bugs discovery in macOS Monterey in the year 2022. This flaw impacts the WebKit component, which is a cross-platform web browser engine that is predominantly used in Safari. This vulnerability tracked as CVE-2022-22620 exists due to a use-after-free error when processing HTML content in WebKit. The attacker can exploit this vulnerability by targeting users to visit a specially crafted web page. Once a user opens the malicious web page, the attacker can remotely execute malicious code on the targeted system. In case of an attack where code injection and execution is successful, the behavior of the target machine is entirely dependent on the intended purpose of the injected code. This vulnerability is been exploited in the wild and we suggest organizations upgrade to macOS Monterey 12.2.1. Potential MITRE ATT&CK TTPs are: TA0001: Initial Access TA0002: Execution T1204: User Execution T1189: Drive-by Compromise T1190: Exploit-public facing application T1203: Exploitation for Client Execution T1204.001: User Execution: Malicious Link Vulnerability Details Patch Link References