
Cloud Vulnerability DB
A community-led vulnerabilities database
A validation issue was discovered in the handling of symlinks in Apple macOS systems (CVE-2022-22582). The vulnerability was disclosed and patched in March 2022, affecting multiple versions of macOS including Catalina, Big Sur 11.6.5, and Monterey 12.3. The issue was discovered by Richard Warren of NCC Group (Apple Security).
The vulnerability exists in the xar component of macOS and involves improper validation of symlinks. The issue has a CVSS v3.1 Base Score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N, indicating local access is required and the impact primarily affects integrity (NVD).
When exploited, this vulnerability allows a local user to write arbitrary files to the system, potentially leading to privilege escalation or unauthorized file system modifications (Apple Security, NVD).
Apple has addressed this vulnerability by improving the validation of symlinks in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5, and macOS Monterey 12.3. Users are advised to update to these versions or later to mitigate the risk (Apple Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."