Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Zero Click Vulnerability Exposes macOS Users

September 12, 2024
Reading Time: 2 mins read
in Alerts

A critical zero-click vulnerability, identified as CVE-2022-46723, was discovered in macOS Calendar by security researcher Mikko Kenttala in 2022. This vulnerability allowed attackers to exploit the Calendar app without requiring any user interaction. The attack begins with a malicious calendar invite that contains a file attachment with an unsanitized filename. This file allows attackers to perform a directory traversal attack, enabling them to place files in unintended locations on the victim’s filesystem. By overwriting or deleting files in the Calendar app’s sandboxed environment, attackers could manipulate the system to execute harmful code.

The vulnerability also presented the opportunity to escalate the attack by injecting calendar files containing malicious code. These files, designed to execute when macOS is upgraded, particularly from Monterey to Ventura, would trigger automatic execution of .dmg images or .url shortcuts. This could eventually lead to remote code execution (RCE), where attackers could gain full control over the victim’s device. Additionally, Kenttala demonstrated how an attacker could abuse the vulnerability in combination with a security evasion in the Photos app, allowing access to private photos stored in iCloud.

By manipulating the configuration of Photos to use an unprotected directory as the System Photo Library, attackers could bypass the Transparency, Consent, and Control (TCC) protection. This allowed them to gain unauthorized access to iCloud photos and potentially leak sensitive user data. The vulnerability highlights the growing risk of sophisticated zero-click exploits that target personal and sensitive information stored on devices. Without proper safeguards, such vulnerabilities could have widespread consequences for users’ privacy and security.

Apple responded to the discovery by releasing fixes between October 2022 and September 2023. These updates tightened file permissions in the Calendar app and added additional security layers to prevent the directory traversal attack. Apple also advised users to keep their devices up to date and limit app access to sensitive data, such as calendars and photos, to further strengthen security. Despite these patches, the incident underscores the importance of staying vigilant and applying security updates promptly to defend against evolving threats like zero-click exploits.

 

Reference:

  • Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS

Tags: Cyber AlertsCyber Alerts 2024Cyber threatsmacOS CalendarMikko KenttalaSeptember 2024Vulnerabilitieszero-click
ADVERTISEMENT

Related Posts

AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025
hpingbot Botnet Uses Pastebin C2 Channel

APT36 Targets Indian Defense Linux Systems

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

hpingbot Botnet Uses Pastebin C2 Channel

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial