7.8
CVSSv3

CVE-2022-22639

Published: 18/03/2022 Updated: 08/08/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A logic issue was addressed with improved state management. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. An application may be able to gain elevated privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple macos

apple iphone os

apple ipados

Vendor Advisories

About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security updates page Apple security documents reference vulnerabilities by CVE-ID&nbsp ...
About Apple security updates For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available Recent releases are listed on the Apple security updates page Apple security documents reference vulnerabilities by CVE-ID&nbsp ...

Github Repositories

CVE-2022-22639: Get a Root Shell on macOS Monterey

Details See Blog: wwwtrendmicrocom/en_us/research/22/d/macos-suhelper-root-privilege-escalation-vulnerability-a-deep-dihtml Exploitation of CVE-2022-22639 Compile with command: clang exploitm -o /tmp/exploit -framework Foundation -fobjc-arc -fobjc-link-runtime /Applications/Xcodeapp/Contents/Developer/Platforms/MacOSXplatform/Developer/SDKs/MacOSXsdk/System/Libr