语言:
严重性: Critical
ID: 159106
文件名: macos_HT213183.nasl
版本: 1.9
类型: local
代理: macosx
发布时间: 2022/3/21
最近更新时间: 2024/5/28
支持的传感器: Nessus Agent, Nessus
风险因素: High
分数: 8.9
风险因素: High
基本分数: 9.3
时间分数: 8.1
矢量: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2022-22665
风险因素: Critical
基本分数: 9.8
时间分数: 9.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2022-22641
CPE: cpe:/o:apple:mac_os_x:12.0, cpe:/o:apple:macos:12.0
可利用: true
易利用性: Exploits are available
补丁发布日期: 2022/3/14
漏洞发布日期: 2022/3/14
Metasploit (macOS Gatekeeper check bypass)
CVE: CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2021-36976, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4192, CVE-2021-4193, CVE-2021-46059, CVE-2022-0128, CVE-2022-0156, CVE-2022-0158, CVE-2022-22582, CVE-2022-22597, CVE-2022-22599, CVE-2022-22600, CVE-2022-22609, CVE-2022-22610, CVE-2022-22611, CVE-2022-22612, CVE-2022-22613, CVE-2022-22614, CVE-2022-22615, CVE-2022-22616, CVE-2022-22617, CVE-2022-22621, CVE-2022-22623, CVE-2022-22624, CVE-2022-22625, CVE-2022-22626, CVE-2022-22627, CVE-2022-22628, CVE-2022-22629, CVE-2022-22631, CVE-2022-22632, CVE-2022-22633, CVE-2022-22637, CVE-2022-22638, CVE-2022-22639, CVE-2022-22640, CVE-2022-22641, CVE-2022-22643, CVE-2022-22644, CVE-2022-22647, CVE-2022-22648, CVE-2022-22650, CVE-2022-22651, CVE-2022-22656, CVE-2022-22657, CVE-2022-22660, CVE-2022-22661, CVE-2022-22662, CVE-2022-22664, CVE-2022-22665, CVE-2022-22668, CVE-2022-22669
APPLE-SA: APPLE-SA-2022-03-14-4, HT213183
IAVA: 2022-A-0118-S, 2022-A-0442-S