Vulnerability identifier: #VU65596
Vulnerability risk: High
Exploitation vector: Network
Exploit availability: No
Vendor: Apple Inc.
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in ICU components when processing untrusted input. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
Install updates from vendor's website.
Vulnerable software versions
macOS: 12.0 21A344 - 12.4 21F79
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?