First published: Mon May 16 2022(Updated: )
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution.
Credit: Felix Poulin-Belanger Felix Poulin-Belanger product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Big Sur | <11.6.6 | 11.6.6 |
<12.4 | 12.4 | |
Apple macOS | >=11.0<11.6.6 | |
Apple macOS | >=12.0<12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-26723 is a memory corruption issue in SMB that has been fixed in macOS Monterey 12.4 and macOS Big Sur 11.6.6.
CVE-2022-26723 can be exploited by mounting a maliciously crafted Samba network share, which may lead to arbitrary code execution.
CVE-2022-26723 has a severity rating of 9.8 (Critical).
To fix CVE-2022-26723, update your macOS to version 12.4 if you are on macOS Monterey, or update to version 11.6.6 if you are on macOS Big Sur. Regularly installing software updates is important for maintaining security.
You can find more information about CVE-2022-26723 on Apple's official support page: [CVE-2022-26723](https://support.apple.com/en-us/HT213256).