ID

VAR-202205-2047


CVE

CVE-2022-26688


TITLE

macOS  Link interpretation vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011791

DESCRIPTION

An issue in the handling of symlinks was addressed with improved validation. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A malicious app with root privileges may be able to modify the contents of system files. macOS Exists in a link interpretation vulnerability.Information may be tampered with. This vulnerability allows local attackers to bypass System Integrity Protection on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within PackageKit. By creating a symbolic link, an attacker can abuse the service to overwrite arbitrary files. Apple macOS Monterey is the eighteenth major release of Apple's Macintosh desktop operating system, macOS

Trust: 2.43

sources: NVD: CVE-2022-26688 // JVNDB: JVNDB-2022-011791 // ZDI: ZDI-22-877 // VULHUB: VHN-417357 // VULMON: CVE-2022-26688

AFFECTED PRODUCTS

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.6.5

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.3

Trust: 1.0

vendor:アップルmodel:apple mac os xscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:applemodel:macosscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-22-877 // JVNDB: JVNDB-2022-011791 // NVD: CVE-2022-26688

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-26688
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-26688
value: MEDIUM

Trust: 0.8

ZDI: CVE-2022-26688
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-202205-4222
value: MEDIUM

Trust: 0.6

VULHUB: VHN-417357
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-26688
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:C/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-417357
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:C/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-26688
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-26688
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2022-26688
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-877 // VULHUB: VHN-417357 // JVNDB: JVNDB-2022-011791 // CNNVD: CNNVD-202205-4222 // NVD: CVE-2022-26688

PROBLEMTYPE DATA

problemtype:CWE-59

Trust: 1.1

problemtype:Link interpretation problem (CWE-59) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-417357 // JVNDB: JVNDB-2022-011791 // NVD: CVE-2022-26688

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202205-4222

TYPE

post link

Trust: 0.6

sources: CNNVD: CNNVD-202205-4222

PATCH

title:HT213184 Apple  Security updateurl:https://support.apple.com/en-us/HT213183

Trust: 1.5

title:Apple macOS Monterey Post-link vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195368

Trust: 0.6

sources: ZDI: ZDI-22-877 // JVNDB: JVNDB-2022-011791 // CNNVD: CNNVD-202205-4222

EXTERNAL IDS

db:NVDid:CVE-2022-26688

Trust: 4.1

db:JVNDBid:JVNDB-2022-011791

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-16052

Trust: 0.7

db:ZDIid:ZDI-22-877

Trust: 0.7

db:CNNVDid:CNNVD-202205-4222

Trust: 0.7

db:VULHUBid:VHN-417357

Trust: 0.1

db:VULMONid:CVE-2022-26688

Trust: 0.1

sources: ZDI: ZDI-22-877 // VULHUB: VHN-417357 // VULMON: CVE-2022-26688 // JVNDB: JVNDB-2022-011791 // CNNVD: CNNVD-202205-4222 // NVD: CVE-2022-26688

REFERENCES

url:https://support.apple.com/en-us/ht213183

Trust: 2.5

url:https://support.apple.com/en-us/ht213184

Trust: 1.8

url:https://support.apple.com/en-us/ht213185

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-26688

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-26688/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-22-877 // VULHUB: VHN-417357 // VULMON: CVE-2022-26688 // JVNDB: JVNDB-2022-011791 // CNNVD: CNNVD-202205-4222 // NVD: CVE-2022-26688

CREDITS

Mickey Jin (@patch1t) of Trend Micro

Trust: 0.7

sources: ZDI: ZDI-22-877

SOURCES

db:ZDIid:ZDI-22-877
db:VULHUBid:VHN-417357
db:VULMONid:CVE-2022-26688
db:JVNDBid:JVNDB-2022-011791
db:CNNVDid:CNNVD-202205-4222
db:NVDid:CVE-2022-26688

LAST UPDATE DATE

2024-11-23T23:10:52.698000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-877date:2022-06-29T00:00:00
db:VULHUBid:VHN-417357date:2022-06-08T00:00:00
db:VULMONid:CVE-2022-26688date:2022-05-27T00:00:00
db:JVNDBid:JVNDB-2022-011791date:2023-08-24T01:57:00
db:CNNVDid:CNNVD-202205-4222date:2022-06-09T00:00:00
db:NVDid:CVE-2022-26688date:2024-11-21T06:54:19.403

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-877date:2022-06-29T00:00:00
db:VULHUBid:VHN-417357date:2022-05-26T00:00:00
db:VULMONid:CVE-2022-26688date:2022-05-26T00:00:00
db:JVNDBid:JVNDB-2022-011791date:2023-08-24T00:00:00
db:CNNVDid:CNNVD-202205-4222date:2022-05-26T00:00:00
db:NVDid:CVE-2022-26688date:2022-05-26T18:15:09.247