Advisory Details

June 29th, 2022

Apple macOS PackageKit PKCoreShove Link Following System Integrity Protection Bypass Vulnerability

ZDI-22-877
ZDI-CAN-16052

CVE ID CVE-2022-26688
CVSS SCORE 5.5, AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
AFFECTED VENDORS Apple
AFFECTED PRODUCTS macOS
VULNERABILITY DETAILS

This vulnerability allows local attackers to bypass System Integrity Protection on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within PackageKit. By creating a symbolic link, an attacker can abuse the service to overwrite arbitrary files. An attacker can leverage this vulnerability to escalate privileges and modify the contents of system files.

ADDITIONAL DETAILS Apple has issued an update to correct this vulnerability. More details can be found at:
https://support.apple.com/en-us/HT213183
DISCLOSURE TIMELINE
  • 2021-12-03 - Vulnerability reported to vendor
  • 2022-06-29 - Coordinated public release of advisory
CREDIT Mickey Jin (@patch1t) of Trend Micro
BACK TO ADVISORIES