SB2022031439 - Multiple vulnerabilities in Apple watchOS



SB2022031439 - Multiple vulnerabilities in Apple watchOS

Published: March 14, 2022 Updated: June 12, 2023

Security Bulletin ID SB2022031439
Severity
High
Patch available
YES
Number of vulnerabilities 27
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 30% Medium 15% Low 56%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 27 secuirty vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2022-22618)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to an unspecified error. An attacker with physical access to device can bypass the Emergency SOS passcode prompt.


2) Origin validation error (CVE-ID: CVE-2022-22637)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to a logic error in WebKit. A remote attacker can trick the victim to visit a specially crafted website and cause unexpected cross-origin behavior.


3) Heap-based buffer overflow (CVE-ID: CVE-2022-22629)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content within the WebGLMultiDraw component. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Use-after-free (CVE-ID: CVE-2022-22628)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


5) Use-after-free (CVE-ID: CVE-2022-22624)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


6) Buffer overflow (CVE-ID: CVE-2022-22610)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Information disclosure (CVE-ID: CVE-2022-22662)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a cookie management issue in WebKit. A remote attacker can trick the victim to open a specially crafted webpage and gain access to sensitive information.


8) Information disclosure (CVE-ID: CVE-2022-22621)

The vulnerability allows an attacker to gain access to potentially sensitive information.

The vulnerability exists due to sensitive information disclosure via keyboard suggestions. An attacker with physical access to the system can gain access to sensitive information.


9) Security restrictions bypass (CVE-ID: CVE-2022-22599)

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to an error in Siri. An attacker with physical access to device can use Siri to obtain some location information from the lock screen.


10) Security restrictions bypass (CVE-ID: CVE-2022-22600)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to incorrect permissions logic in Sandbox. A malicious application can bypass certain Privacy preferences.


11) Improper access control (CVE-ID: CVE-2022-22609)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Preferences feature. A malicious application can read other applications' settings.


12) Improper access control (CVE-ID: CVE-2022-22670)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in MediaRemote. A local application can bypass implemented security restrictions and identify other installed applications on the device.


13) Buffer overflow (CVE-ID: CVE-2022-22633)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files within Accelerate Framework. A remote attacker can create a specially crafted PDF, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Use-after-free (CVE-ID: CVE-2021-36976)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in copy_string. A remote attacker can cause a denial of service condition on the target system.


15) NULL pointer dereference (CVE-ID: CVE-2022-22638)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in macOS kernel. A local user can run a specially crafted program and perform a denial of service (DoS) attack.


16) Security restrictions bypass (CVE-ID: CVE-2022-22632)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper state management in macOS kernel. A local user can execute arbitrary code with elevated privileges.


17) Use-after-free (CVE-ID: CVE-2022-22615)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A malicious application can trigger a use-after-free error and execute arbitrary code with kernel privileges.

18) Use-after-free (CVE-ID: CVE-2022-22614)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A malicious application can trigger a use-after-free error and execute arbitrary code with kernel privileges.

19) Out-of-bounds write (CVE-ID: CVE-2022-22613)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A malicious application can trigger an out-of-bounds write error and execute arbitrary code with kernel privileges.


20) Buffer overflow (CVE-ID: CVE-2022-22640)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system.


21) Buffer overflow (CVE-ID: CVE-2022-22596)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in macOS kernel. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system.

22) Heap-based buffer overflow (CVE-ID: CVE-2022-22612)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in ImageIO. A remote attacker can trick the victim to open a specially crafted file, trigger a heap corruption and perform a denial of service (DoS) attack.


23) Out-of-bounds read (CVE-ID: CVE-2022-22611)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and execute arbitrary code on the system.


24) Buffer overflow (CVE-ID: CVE-2022-22666)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing image files in AppleAVD. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


25) Spoofing attack (CVE-ID: CVE-2022-22654)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data in Safari. A remote attacker can spoof the address bar.


26) Security restrictions bypass (CVE-ID: CVE-2021-30946)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to a logic issue in the Sandbox feature. A malicious application can bypass certain Privacy preferences.


27) Race condition (CVE-ID: CVE-2022-21658)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to a race condition in std::fs::remove_dir_all. A remote attacker can exploit the race, escalate privileges and delete arbitrary files on the system.


Remediation

Install update from vendor's website.