Language:
Severity: Critical
ID: 159106
File Name: macos_HT213183.nasl
Version: 1.9
Type: local
Agent: macosx
Family: MacOS X Local Security Checks
Published: 3/21/2022
Updated: 5/28/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-22665
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2022-22641
CPE: cpe:/o:apple:mac_os_x:12.0, cpe:/o:apple:macos:12.0
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/14/2022
Vulnerability Publication Date: 3/14/2022
Metasploit (macOS Gatekeeper check bypass)
CVE: CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2021-36976, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4192, CVE-2021-4193, CVE-2021-46059, CVE-2022-0128, CVE-2022-0156, CVE-2022-0158, CVE-2022-22582, CVE-2022-22597, CVE-2022-22599, CVE-2022-22600, CVE-2022-22609, CVE-2022-22610, CVE-2022-22611, CVE-2022-22612, CVE-2022-22613, CVE-2022-22614, CVE-2022-22615, CVE-2022-22616, CVE-2022-22617, CVE-2022-22621, CVE-2022-22623, CVE-2022-22624, CVE-2022-22625, CVE-2022-22626, CVE-2022-22627, CVE-2022-22628, CVE-2022-22629, CVE-2022-22631, CVE-2022-22632, CVE-2022-22633, CVE-2022-22637, CVE-2022-22638, CVE-2022-22639, CVE-2022-22640, CVE-2022-22641, CVE-2022-22643, CVE-2022-22644, CVE-2022-22647, CVE-2022-22648, CVE-2022-22650, CVE-2022-22651, CVE-2022-22656, CVE-2022-22657, CVE-2022-22660, CVE-2022-22661, CVE-2022-22662, CVE-2022-22664, CVE-2022-22665, CVE-2022-22668, CVE-2022-22669
APPLE-SA: APPLE-SA-2022-03-14-4, HT213183
IAVA: 2022-A-0118-S, 2022-A-0442-S