First published: Mon Mar 14 2022(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.6.6, macOS Monterey 12.3, Security Update 2022-004 Catalina. A remote user may cause an unexpected app termination or arbitrary code execution
Credit: Jeremy Brown Trend Micro Zero Day InitiativeLockheed Martin Red Team an anonymous researcher Michael DePlante @izobashi Trend Micro Zero Day InitiativeQi Sun Trend MicroYe Zhang @co0py_Cat Baidu SecurityRobert Ai Trend MicroArsenii Kostromin (0x3c3e) Yonghwi Jin @jinmo123 TheoriLinus Henze Pinauten GmbHLiu Long Ant Security LightJack Dates RET2 Systems IncAntonio Zekic @antoniozekic Jeonghoon Shin Theori working with Trend Micro Zero Day InitiativePeter Nguyễn Vũ Hoàng @peternguyen14 STAR LabsNed Williamson Google Project Zero @gorelics BreakPoint BreakPointRon Masas BreakPointWojciech Reguła @_r3ggi SecuRingArsenii Kostromin (0x3c3e) MicrosoftJonathan Bar Or MicrosoftZhipeng Huo @R3dF09 Tencent Security Xuanwu LabYuebin Sun @yuebinsun2020 Tencent Security Xuanwu LabMax Shavrick @_mxms the Google Security TeamZubair Ashraf CrowdstrikeCVE-2022-0778 CVE-2022-23308 Mickey Jin @patch1t @gorelics Peter Nguyễn Vũ Hoàng STAR LabsFelix Poulin-Belanger Antonio Cheong Yu Xuan YCISCQCVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 Heige KnownSec 404 TeamBo Qu Palo Alto NetworksScarlet Raine Wang Yu CyberservalCVE-2022-0530 Tavis Ormandy CVE-2021-45444 CVE-2021-44224 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.3 | 12.3 |
Apple macOS | <11.6.6 | 11.6.6 |
macOS Catalina | ||
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2020 | |
Apple iOS and macOS | =10.15.7-security_update_2020-001 | |
Apple iOS and macOS | =10.15.7-security_update_2020-005 | |
Apple iOS and macOS | =10.15.7-security_update_2020-007 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-security_update_2021-006 | |
Apple iOS and macOS | =10.15.7-security_update_2021-007 | |
Apple iOS and macOS | =10.15.7-security_update_2021-008 | |
Apple iOS and macOS | =10.15.7-security_update_2022-001 | |
Apple iOS and macOS | =10.15.7-security_update_2022-002 | |
Apple iOS and macOS | =10.15.7-security_update_2022-003 | |
Apple iOS and macOS | >=11.0<11.6.6 | |
Apple iOS and macOS | >=12.0<12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-22630 is a vulnerability found in AppleEvents that allows for a use after free issue.
The severity of CVE-2022-22630 is not specified.
CVE-2022-22630 affects Apple software such as macOS Catalina, macOS Big Sur (up to version 11.6.6), and macOS Monterey (up to version 12.3).
To fix CVE-2022-22630, Apple has addressed the issue with improved memory management. Update to the latest versions of affected software.
More information about CVE-2022-22630 can be found on the Apple support website: [https://support.apple.com/en-us/HT213183](https://support.apple.com/en-us/HT213183), [https://support.apple.com/en-us/HT213256](https://support.apple.com/en-us/HT213256), [https://support.apple.com/en-us/HT213255](https://support.apple.com/en-us/HT213255).