
Whoa, nelly! Eight vulnerabilities have been added to CISA’s Known Exploited Vulnerabilities Catalog. We have remote code execution, privilege escalation and the complete compromise of Confidentiality, Integrity and Availability of a system. Let’s dive into a few and see what smarter people than I have to say. Resources will be at the bottom and linked throughout the piece.
CVE-2022-32894 and CVE-2022-32893: CWE-787, Out-of-bounds Write.
Can’t flip on the TV to get your daily dose of social, cultural, and environmental decline without some talking head getting the newest Apple vulnerabilities in your existential dread. What gives? Well, 32894 allows an attacker to escalate privileges via a local application. This local application triggers an out-of-bounds write error allowing the execution of arbitrary code with kernel privileges. 32893 “is a boundary error in WebKit when processing HTML content.” If a user opens a malicious website created by a remote attacker, an out-of-bounds write is triggered which executes arbitrary code.
Apple users need to update Monterey.
CVE-2022-22536: CWE-444, HTTP Request/Response Smuggling or Memory Pipe Desynchronization per Tenable.
This one received a perfect CVSSv3 score of 10.0 and affects SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server and SAP Web Dispatcher. Per an Onapsis threat report that is available to download on their website, the vulnerability appears
…when an internal handler is able to generate a response, and the size of the request is bigger than that of the MPI Buffer. If a proxy is placed between the ICM and the clients, an attacker could leverage this to take over the application by exploiting the HTTP desynchronization between both components.
SAP users can access a patch via their account.
CVE-2022-2856: CWE-20 Improper Input Validation.
This one is fun since it fits the theme of a couple articles that a user has been posting recently and it’s another Google Zero Day! We don’t know much more than this tidbit found on Google’s blog: “insufficient validation of untrusted input in Intents.” Presumably we’ll know more once the update has had a chance to make it around.
Chrome users need to install the recent update.
Sources that were not linked above:
https://www.cybersecurity-help.cz/vdb/SB2022081718
https://onapsis.com/threat-report/icmad-sap-vulnerabilities (downloads the PDF)
#CISAnalysis #apple #google #rce #cisa #zeroday
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

