ID

VAR-202205-2096


CVE

CVE-2022-22676


TITLE

macOS  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011794

DESCRIPTION

An event handler validation issue in the XPC Services API was addressed by removing the service. This issue is fixed in macOS Monterey 12.2. An application may be able to delete files for which it does not have permission. macOS Exists in unspecified vulnerabilities.Information may be tampered with. This vulnerability allows local attackers to bypass System Integrity Protection on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within PackageKit. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and delete files normally protected from the user. Apple macOS Monterey is the eighteenth major release of Apple's Macintosh desktop operating system, macOS

Trust: 2.43

sources: NVD: CVE-2022-22676 // JVNDB: JVNDB-2022-011794 // ZDI: ZDI-22-878 // VULHUB: VHN-411304 // VULMON: CVE-2022-22676

AFFECTED PRODUCTS

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.2

Trust: 1.0

vendor:アップルmodel:macosscope:eqversion: -

Trust: 0.8

vendor:アップルmodel:macosscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:12.0.0 that's all 12.2

Trust: 0.8

vendor:applemodel:macosscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-22-878 // JVNDB: JVNDB-2022-011794 // NVD: CVE-2022-22676

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-22676
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-22676
value: MEDIUM

Trust: 0.8

ZDI: CVE-2022-22676
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-202205-4221
value: MEDIUM

Trust: 0.6

VULHUB: VHN-411304
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-22676
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-22676
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-411304
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-22676
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-22676
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2022-22676
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-878 // VULHUB: VHN-411304 // VULMON: CVE-2022-22676 // JVNDB: JVNDB-2022-011794 // CNNVD: CNNVD-202205-4221 // NVD: CVE-2022-22676

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-20

Trust: 0.1

sources: VULHUB: VHN-411304 // JVNDB: JVNDB-2022-011794 // NVD: CVE-2022-22676

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202205-4221

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202205-4221

PATCH

title:HT213054 Apple  Security updateurl:https://support.apple.com/en-us/HT213054

Trust: 1.5

title:Apple macOS Monterey Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=195367

Trust: 0.6

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: ZDI: ZDI-22-878 // VULMON: CVE-2022-22676 // JVNDB: JVNDB-2022-011794 // CNNVD: CNNVD-202205-4221

EXTERNAL IDS

db:NVDid:CVE-2022-22676

Trust: 4.1

db:JVNDBid:JVNDB-2022-011794

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-16111

Trust: 0.7

db:ZDIid:ZDI-22-878

Trust: 0.7

db:CNNVDid:CNNVD-202205-4221

Trust: 0.7

db:VULHUBid:VHN-411304

Trust: 0.1

db:VULMONid:CVE-2022-22676

Trust: 0.1

sources: ZDI: ZDI-22-878 // VULHUB: VHN-411304 // VULMON: CVE-2022-22676 // JVNDB: JVNDB-2022-011794 // CNNVD: CNNVD-202205-4221 // NVD: CVE-2022-22676

REFERENCES

url:https://support.apple.com/en-us/ht213054

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-22676

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-22676/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

sources: ZDI: ZDI-22-878 // VULHUB: VHN-411304 // VULMON: CVE-2022-22676 // JVNDB: JVNDB-2022-011794 // CNNVD: CNNVD-202205-4221 // NVD: CVE-2022-22676

CREDITS

Mickey Jin (@patch1t) of Trend Micro

Trust: 0.7

sources: ZDI: ZDI-22-878

SOURCES

db:ZDIid:ZDI-22-878
db:VULHUBid:VHN-411304
db:VULMONid:CVE-2022-22676
db:JVNDBid:JVNDB-2022-011794
db:CNNVDid:CNNVD-202205-4221
db:NVDid:CVE-2022-22676

LAST UPDATE DATE

2024-08-14T13:53:20.102000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-878date:2022-06-29T00:00:00
db:VULHUBid:VHN-411304date:2022-06-08T00:00:00
db:VULMONid:CVE-2022-22676date:2023-08-08T00:00:00
db:JVNDBid:JVNDB-2022-011794date:2023-08-24T01:59:00
db:CNNVDid:CNNVD-202205-4221date:2022-06-09T00:00:00
db:NVDid:CVE-2022-22676date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-878date:2022-06-29T00:00:00
db:VULHUBid:VHN-411304date:2022-05-26T00:00:00
db:VULMONid:CVE-2022-22676date:2022-05-26T00:00:00
db:JVNDBid:JVNDB-2022-011794date:2023-08-24T00:00:00
db:CNNVDid:CNNVD-202205-4221date:2022-05-26T00:00:00
db:NVDid:CVE-2022-22676date:2022-05-26T18:15:09.200