Open Nav
Sign Up

CISA Warns of Active Exploitation of Critical Flaws in Apple Products (CVE-2022-48618)

Bar Refael

February 1, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of critical vulnerabilities in multiple Apple products. This advisory comes shortly after the agency added a high-severity flaw to its Known Exploited Vulnerabilities (KEV) catalog. The threat pertains to a wide range of Apple operating systems and highlights the urgency for immediate remedial actions to mitigate potential cyberattacks.

Vulnerability Details:

  • CVE ID: CVE-2022-48618
  • CVSS Score: 7.8
  • Affected Products: iOS, iPadOS, macOS, tvOS, and watchOS
  • Vulnerability Type: Kernel Component Bug
  • Description: This vulnerability allows an attacker with arbitrary read and write capabilities to bypass Pointer Authentication, posing a critical security risk. Apple has acknowledged that this flaw “may have been exploited against versions of iOS released before iOS 15.7.1.”

Actions Taken by Apple:

  • Patches Released: Apple addressed this issue by releasing patches on December 13, 2022, for various operating systems, including iOS 16.2, iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, and watchOS 9.2.
  • Previous Similar Issue: A related vulnerability, CVE-2022-32844 (CVSS score: 6.3), was previously addressed in iOS 15.6 and iPadOS 15.6, released on July 20, 2022. This flaw also involved bypassing Pointer Authentication due to a logic issue that was corrected with improved state management.
  • Public Disclosure: Despite the patches being released in late 2022, the issue was only publicly disclosed over a year later, on January 9, 2024, underscoring the criticality and sensitivity of the vulnerability.

CISA Advisory and Deadline:

In response to the active exploitation of CVE-2022-48618, CISA has advised Federal Civilian Executive Branch (FCEB) agencies to apply the provided fixes by February 21, 2024, emphasizing the need for rapid action to protect federal networks and data.

Additional Security Concerns:

Apart from CVE-2022-48618, Apple has recently expanded patches for another actively exploited security flaw in the WebKit browser engine, identified as CVE-2024-23222 (CVSS score: 8.8). This vulnerability also extends to Apple’s Vision Pro headset, with the fix being available in visionOS 1.0.2, signifying the evolving threat landscape and the necessity for continuous vigilance and prompt response.

Conclusion:

The identification and active exploitation of CVE-2022-48618, along with other critical vulnerabilities in Apple’s ecosystem, highlight the persistent and sophisticated nature of cyber threats. Both CISA and Apple have taken significant steps to address these vulnerabilities. It is imperative for all organizations, especially FCEB agencies, to adhere to the advisory timelines and implement the necessary patches to safeguard their infrastructures from potential cyberattacks.

Stay safe and informed,

OP Innovate.

Resources highlights

Cisco IOS and IOS XE SNMP Zero-Day Actively Exploited (CVE-2025-20352)

Cisco disclosed CVE-2025-20352, a stack overflow in the SNMP subsystem of IOS and IOS XE, now confirmed as actively exploited in the wild. Attackers can…

Read more >

CVE-2025-20352

SolarWinds Web Help Desk (WHD) Unauthenticated RCE Patch-Bypass (CVE-2025-26399)

SolarWinds released Web Help Desk 12.8.7 Hotfix 1 to fix CVE-2025-26399, an unauthenticated remote code execution flaw in the AjaxProxy component caused by unsafe deserialization.…

Read more >

CVE-2025-26399

SonicWall Cloud Backup Compromise & Ongoing SSLVPN Exploitation

Threat actors gained access to MySonicWall cloud backup preference files after brute-forcing the vendor’s portal. These files, although encrypted, contain sensitive configuration data such as…

Read more >

sonicwall cloud

Ongoing Supply-Chain Attack Targeting npm Packages (aka “Shai-Hulud”)

Beginning on September 14, 2025, and accelerating over the next two days, attackers launched a large-scale supply-chain attack against the npm ecosystem. The campaign injected…

Read more >

Shai-Hulud

FBI Advisory: UNC6040/UNC6395 Targeting Salesforce Environments

The FBI has issued a FLASH advisory detailing activity from the threat groups UNC6040 and UNC6395, who are actively conducting data theft and extortion campaigns…

Read more >

salesforce fbi advisory

CVE-2024-40766: SonicWall SSL VPN Flaw Actively Exploited by Ransomware Threat Actors

CVE-2024-40766 is a critical improper access control vulnerability in SonicWall SonicOS management access/SSLVPN. Successful exploitation enables unauthorized access and can, in some cases, crash the…

Read more >

CVE-2024-40766
Under Cyber Attack?

Fill out the form and we will contact you immediately.