Open Nav
Sign Up

CISA Warns of Active Exploitation of Critical Flaws in Apple Products (CVE-2022-48618)

Bar Refael

February 1, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of critical vulnerabilities in multiple Apple products. This advisory comes shortly after the agency added a high-severity flaw to its Known Exploited Vulnerabilities (KEV) catalog. The threat pertains to a wide range of Apple operating systems and highlights the urgency for immediate remedial actions to mitigate potential cyberattacks.

Vulnerability Details:

  • CVE ID: CVE-2022-48618
  • CVSS Score: 7.8
  • Affected Products: iOS, iPadOS, macOS, tvOS, and watchOS
  • Vulnerability Type: Kernel Component Bug
  • Description: This vulnerability allows an attacker with arbitrary read and write capabilities to bypass Pointer Authentication, posing a critical security risk. Apple has acknowledged that this flaw “may have been exploited against versions of iOS released before iOS 15.7.1.”

Actions Taken by Apple:

  • Patches Released: Apple addressed this issue by releasing patches on December 13, 2022, for various operating systems, including iOS 16.2, iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, and watchOS 9.2.
  • Previous Similar Issue: A related vulnerability, CVE-2022-32844 (CVSS score: 6.3), was previously addressed in iOS 15.6 and iPadOS 15.6, released on July 20, 2022. This flaw also involved bypassing Pointer Authentication due to a logic issue that was corrected with improved state management.
  • Public Disclosure: Despite the patches being released in late 2022, the issue was only publicly disclosed over a year later, on January 9, 2024, underscoring the criticality and sensitivity of the vulnerability.

CISA Advisory and Deadline:

In response to the active exploitation of CVE-2022-48618, CISA has advised Federal Civilian Executive Branch (FCEB) agencies to apply the provided fixes by February 21, 2024, emphasizing the need for rapid action to protect federal networks and data.

Additional Security Concerns:

Apart from CVE-2022-48618, Apple has recently expanded patches for another actively exploited security flaw in the WebKit browser engine, identified as CVE-2024-23222 (CVSS score: 8.8). This vulnerability also extends to Apple’s Vision Pro headset, with the fix being available in visionOS 1.0.2, signifying the evolving threat landscape and the necessity for continuous vigilance and prompt response.

Conclusion:

The identification and active exploitation of CVE-2022-48618, along with other critical vulnerabilities in Apple’s ecosystem, highlight the persistent and sophisticated nature of cyber threats. Both CISA and Apple have taken significant steps to address these vulnerabilities. It is imperative for all organizations, especially FCEB agencies, to adhere to the advisory timelines and implement the necessary patches to safeguard their infrastructures from potential cyberattacks.

Stay safe and informed,

OP Innovate.

Resources highlights

Critical Zero-Day in CrushFTP Exploited in the Wild (CVE-2025-54309)

A critical zero-day vulnerability in CrushFTP, CVE-2025-54309, is being actively exploited by threat actors to gain unauthenticated administrative access to vulnerable servers via HTTPS. The…

Read more >

CVE-2025-54309

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033
Under Cyber Attack?

Fill out the form and we will contact you immediately.