You are currently viewing Apple Has Addressed A Zero-Day Vulnerability Which Is Being Actively Exploited In The Wild

Apple Has Addressed A Zero-Day Vulnerability Which Is Being Actively Exploited In The Wild

  • Post author:
  • Reading time:2 mins read

 This year, Apple released security updates for their third zero-day vulnerability. Apple addresses a zero-day vulnerability in its Feb 2022 update. However, the affected software processes maliciously crafted web content, leading to arbitrary code execution in WebKit, which is a component included in multiple products. Therefore, a good vulnerability management system can help create a safe and secure environment and prevent these attacks.

The recent Apple zero-day vulnerability Feb 2022 updates for macOS and other Apple products include the fix for this vulnerability. Moreover, It has a name as Use After Free exploit and is tracking as CVE-2022-22620. As on February 2022, it is actively exploiting by malicious users across the globe. Therefore, a Vulnerability Management Tool can resolve these issues and do much more. Hence, Utilizing this will make your organization safe and secure and increase your productivity.

Zero-Day (CVE-2022-22620) Apple zero-day vulnerability Feb 2022 :

Apple’s February security update fixed a critical zero-day vulnerability exploited in the wild. The vulnerability allows an attacker to send malicious web content leading to arbitrary code execution. Its discovery and reporting is by an anonymous researcher.

Affected OS:
macOS Monterey 12.2.1
iOS 15.3.1 and iPadOS 15.3.1
Safari 15.3*
Affected features: WebKit
Impact: Processing maliciously crafted web content may lead to arbitrary code execution.
CVEs: CVE-2022-22620


SanerNow VM and SanerNow PM detect the vulnerability and automatically fixes it by applying a security update. Use SanerNow and keep your systems updated and secure.

Share this article