macOS 12.x < 12.3 (HT213183)

critical Nessus Plugin ID 159106

Synopsis

The remote host is missing a macOS security update.

Description

The remote host is running a version of macOS / Mac OS X that is 12.x prior to 12.3 Monterey. It is, therefore, affected by multiple vulnerabilities, including the following:
- A use after free issue was addressed with improved memory management. Successful exploitation could result in arbitrary code execution with kernel privileges (CVE-2022-22614).

- A logic issue was addressed with improved state management. Successful exploitation could result in privilege escalation (CVE-2022-22632).

- A null pointer dereference was addressed with improved validation. Successful exploitation could result in a denial of service condition. (CVE-2022-22638).

Note that Nessus has not tested for this issue but has instead relied only on the operating system's self-reported version number.

Solution

Upgrade to macOS 12.3 or later.

See Also

https://support.apple.com/en-gb/HT213183

Plugin Details

Severity: Critical

ID: 159106

File Name: macos_HT213183.nasl

Version: 1.4

Type: local

Agent: macosx

Published: 3/21/2022

Updated: 5/10/2022

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

CVSS Score Source: CVE-2022-22665

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:F/RL:O/RC:C

CVSS Score Source: CVE-2022-22641

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/o:apple:macos

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/14/2022

Vulnerability Publication Date: 3/14/2022

Exploitable With

Metasploit (macOS Gatekeeper check bypass)

Reference Information

CVE: CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4192, CVE-2021-4193, CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2021-36976, CVE-2021-46059, CVE-2022-0128, CVE-2022-0156, CVE-2022-0158, CVE-2022-22582, CVE-2022-22597, CVE-2022-22599, CVE-2022-22600, CVE-2022-22609, CVE-2022-22610, CVE-2022-22611, CVE-2022-22612, CVE-2022-22613, CVE-2022-22614, CVE-2022-22615, CVE-2022-22616, CVE-2022-22617, CVE-2022-22621, CVE-2022-22623, CVE-2022-22624, CVE-2022-22625, CVE-2022-22626, CVE-2022-22627, CVE-2022-22628, CVE-2022-22629, CVE-2022-22631, CVE-2022-22632, CVE-2022-22633, CVE-2022-22637, CVE-2022-22638, CVE-2022-22639, CVE-2022-22640, CVE-2022-22641, CVE-2022-22643, CVE-2022-22644, CVE-2022-22647, CVE-2022-22648, CVE-2022-22650, CVE-2022-22651, CVE-2022-22656, CVE-2022-22657, CVE-2022-22660, CVE-2022-22661, CVE-2022-22662, CVE-2022-22664, CVE-2022-22665, CVE-2022-22668, CVE-2022-22669

APPLE-SA: HT213183, APPLE-SA-2022-03-14-4

IAVA: 2022-A-0118