Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Zero Click Vulnerability Exposes macOS Users

September 12, 2024
Reading Time: 2 mins read
in Alerts

A critical zero-click vulnerability, identified as CVE-2022-46723, was discovered in macOS Calendar by security researcher Mikko Kenttala in 2022. This vulnerability allowed attackers to exploit the Calendar app without requiring any user interaction. The attack begins with a malicious calendar invite that contains a file attachment with an unsanitized filename. This file allows attackers to perform a directory traversal attack, enabling them to place files in unintended locations on the victim’s filesystem. By overwriting or deleting files in the Calendar app’s sandboxed environment, attackers could manipulate the system to execute harmful code.

The vulnerability also presented the opportunity to escalate the attack by injecting calendar files containing malicious code. These files, designed to execute when macOS is upgraded, particularly from Monterey to Ventura, would trigger automatic execution of .dmg images or .url shortcuts. This could eventually lead to remote code execution (RCE), where attackers could gain full control over the victim’s device. Additionally, Kenttala demonstrated how an attacker could abuse the vulnerability in combination with a security evasion in the Photos app, allowing access to private photos stored in iCloud.

By manipulating the configuration of Photos to use an unprotected directory as the System Photo Library, attackers could bypass the Transparency, Consent, and Control (TCC) protection. This allowed them to gain unauthorized access to iCloud photos and potentially leak sensitive user data. The vulnerability highlights the growing risk of sophisticated zero-click exploits that target personal and sensitive information stored on devices. Without proper safeguards, such vulnerabilities could have widespread consequences for users’ privacy and security.

Apple responded to the discovery by releasing fixes between October 2022 and September 2023. These updates tightened file permissions in the Calendar app and added additional security layers to prevent the directory traversal attack. Apple also advised users to keep their devices up to date and limit app access to sensitive data, such as calendars and photos, to further strengthen security. Despite these patches, the incident underscores the importance of staying vigilant and applying security updates promptly to defend against evolving threats like zero-click exploits.

 

Reference:

  • Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS

Tags: Cyber AlertsCyber Alerts 2024Cyber threatsmacOS CalendarMikko KenttalaSeptember 2024Vulnerabilitieszero-click
ADVERTISEMENT

Related Posts

DevOps Servers Hit By JINX0132 Crypto Mine

Fake FB Ban Fix Extension Steals Accounts

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Actively Exploited Chrome V8 Flaw Patched

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025
Linux Core Dump Flaws Risk Password Leaks

Linux Core Dump Flaws Risk Password Leaks

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

Google Script Used In New Phishing Scams

June 2, 2025

Latest Alerts

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

Subscribe to our newsletter

    Latest Incidents

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial