Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs & DNSLab, Korea Univ has shared the detailed technique for an Apple Safari ICU Out-Of-Bounds Write (CVE-2022-32787) vulnerability that Apple patched in July this year. This flaw affected iOS 15.6 or iPadOS 15.6 before, Monterey 12.5 before, Big Sur 11.6.8 before, 2022-005 Catalina before, watchOS 8.7 before, and tvOS 15.6 before.
Apple warned that a threat actor can exploit the CVE-2022-32787 flaw to execute arbitrary code and urges users to install patches immediately. To exploit the bug, an attacker can trick the victim to visit maliciously crafted web content.
Dohyun Lee writes in the write-up”A vulnerability in the way Safari handles incoming data sent to the ICU component allows manipulation of the a pointer address in a way that allows attackers that are able to run arbitrary Javascript to obtain a primitive Out of Bounds write.”
For in-depth technical details about the vulnerability, you can head on to the researcher’s write-up on the SSD Secure Disclosure program. Dohyun Lee has published PoC code.
The vulnerability was addressed with the release of new iOS, iPadOS, Monterey, Big Sur, Catalina, watchOS, and tvOS versions. In light of the criticality of some of the issues, users running affected installations are highly recommended to upgrade to the latest version as soon as possible.