{"id":95518,"date":"2022-04-05T05:55:58","date_gmt":"2022-04-05T12:55:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95518"},"modified":"2023-09-23T12:47:58","modified_gmt":"2023-09-23T19:47:58","slug":"apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/","title":{"rendered":"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-92954\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><em>Update:<\/em> After 6.5 weeks\u2014and significant public pressure resulting from this article\u2014Apple finally released patches<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">for<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" href=\"https:\/\/support.apple.com\/en-us\/HT213256\" target=\"_blank\" rel=\"noopener\">macOS Big Sur<\/a><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">and<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" href=\"https:\/\/support.apple.com\/en-us\/HT213255\" target=\"_blank\" rel=\"noopener\">macOS Catalina<\/a> <span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">on May 16 that <\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">address these actively exploited vulnerabilities<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">.<\/span><\/p>\n<p><strong>Apple has chosen to leave an estimated 35\u201340% of all supported Macs in danger of actively exploited vulnerabilities.<\/strong><\/p>\n<p>Last week, on March 31, Apple <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-12-3-1-ios-15-4-1-watchos-8-5-1-and-more\/\">patched<\/a> two \u201cactively exploited\u201d (i.e. in-the-wild, zero-day) security vulnerabilities for macOS Monterey.<\/p>\n<p>After nearly a week, Apple still has not released corresponding security updates to address the same vulnerabilities in the two previous macOS versions, Big Sur (aka macOS 11) and Catalina (aka macOS 10.15).<\/p>\n<p>Both of these macOS versions are ostensibly still receiving patches for &#8220;significant vulnerabilities&#8221;\u2014and actively exploited zero-day vulnerabilities certainly qualify as significant. Apple has maintained the practice of patching the two previous macOS versions alongside the current macOS version for nearly a decade. But now, Apple has neglected to patch both Big Sur and Catalina to address the latest actively exploited vulnerabilities.<\/p>\n<p>Let&#8217;s break down what the problem is, and what Apple needs to do to remedy this serious issue.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#which-vulnerable\">Which Apple operating systems remain vulnerable?<\/a>\n<ul>\n<li><a href=\"#big-sur-22675\">Big Sur: CVE-2022-22675<\/a><\/li>\n<li><a href=\"#big-sur-catalina-22674\">Big Sur and Catalina: CVE-2022-22674<\/a><\/li>\n<li><a href=\"#other-vulns\">Other vulnerabilities in Big Sur and Catalina<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#how-many-macs\">How many Macs are affected by the new vulnerabilities?<\/a><\/li>\n<li><a href=\"#happened-before\">Has anything like this ever happened before?<\/a><\/li>\n<li><a href=\"#faq\">Frequently asked questions<\/a><\/li>\n<li><a href=\"#learn-more\">How can I learn more?<\/a><a name=\"which-vulnerable\"><\/a><\/li>\n<\/ul>\n<h3>Which Apple operating systems remain vulnerable?<\/h3>\n<p>Apple&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-12-3-1-ios-15-4-1-watchos-8-5-1-and-more\/\">macOS Monterey 12.3.1 update<\/a>, released last week, included fixes for two actively exploited vulnerabilities: CVE-2022-22675 (a bug in AppleAVD) and CVE-2022-22674 (a bug in Intel Graphics Driver). The former remains unpatched for macOS Big Sur, and the latter appears to affect both Big Sur and Catalina.<\/p>\n<p>This is the first time since the release of macOS Monterey that Apple has neglected to patch actively exploited vulnerabilities for Big Sur and Catalina. The previous three actively exploited vulnerabilities were each patched simultaneously for Monterey, Big Sur, and Catalina.<\/p>\n<div id=\"attachment_95521\" style=\"width: 1022px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-95521\" loading=\"lazy\" class=\"wp-image-95521 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/actively-exploited-macos-monterey-vulnerabilities-20220404.png\" alt=\"\" width=\"1012\" height=\"304\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/actively-exploited-macos-monterey-vulnerabilities-20220404.png 1012w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/actively-exploited-macos-monterey-vulnerabilities-20220404-300x90.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/actively-exploited-macos-monterey-vulnerabilities-20220404-150x45.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/actively-exploited-macos-monterey-vulnerabilities-20220404-768x231.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/actively-exploited-macos-monterey-vulnerabilities-20220404-657x197.png 657w\" sizes=\"(max-width: 1012px) 100vw, 1012px\" \/><p id=\"caption-attachment-95521\" class=\"wp-caption-text\"><a name=\"big-sur-22675\"><\/a> List of all macOS Monterey-era vulnerabilities that Apple has identified as actively exploited (i.e. zero-day vulnerabilities used in in-the-wild attacks). Until now, Apple had patched them simultaneously for all three supported macOS versions. Credit: Intego.<\/p><\/div>\n<h4><strong><br \/>\nBig Sur: CVE-2022-22675<br \/>\n<\/strong><\/h4>\n<p><strong><br \/>\nIntego has confirmed that macOS Big Sur remains vulnerable to CVE-2022-22675<\/strong>, an actively exploited vulnerability in the AppleAVD component.<\/p>\n<p>Last week, <a href=\"https:\/\/twitter.com\/patch1t\" target=\"_blank\" rel=\"noopener\">Mickey Jin<\/a>\u2014one of the top reporters of OS vulnerabilities to Apple\u2014reverse engineered Apple&#8217;s patch for macOS Monterey. He then verified that macOS Big Sur does indeed still contain the same vulnerability. Jin <a href=\"https:\/\/twitter.com\/patch1t\/status\/1510050646816616455\">observed<\/a> that M1-based Macs running macOS Big Sur remain vulnerable to CVE-2022-22675.<\/p>\n<p>We have inquired of Apple several times about this over the past week. Apple has not responded to any of our questions. It remains a mystery why Apple seems to have deliberately left macOS Big Sur susceptible to this actively exploited vulnerability. It is also unknown whether or not a patch may come eventually (either because Apple was already planning to, or due to public pressure).<\/p>\n<p>Meanwhile, macOS Catalina does not contain the vulnerable component, AppleAVD, so Catalina is unaffected by CVE-2022-22675 specifically.<\/p>\n<p>Incidentally, according to Jin, it appears that <strong>iOS 14 and iPadOS 14 are also vulnerable to CVE-2022-22675<\/strong>. However, Apple officially (albeit quietly, and without warning) <a href=\"https:\/\/arstechnica.com\/gadgets\/2022\/01\/apple-ends-security-updates-for-ios-14-pushes-users-to-install-ios-15-instead\/\" target=\"_blank\" rel=\"noopener\">stopped supporting iOS and iPadOS 14 in January 2022<\/a>, so it is no surprise that users must upgrade to the latest version of iOS 15 or iPadOS 15 to continue getting security updates. Last week&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-12-3-1-ios-15-4-1-watchos-8-5-1-and-more\/\">iOS and iPadOS 15.4.1 updates<\/a>\u2014which are compatible with all devices running iOS or iPadOS 14\u2014provide a fix for CVE-2022-22675.<\/p>\n<p>By contrast, macOS Monterey and macOS Big Sur each dropped support for certain Mac hardware, so some Mac users cannot upgrade beyond Catalina or Big Sur to receive security updates that are currently only offered in Monterey.<a name=\"big-sur-catalina-22674\"><\/a><\/p>\n<h4><strong><br \/>\nBig Sur and Catalina: CVE-2022-22674<br \/>\n<\/strong><\/h4>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\"><br \/>\nIt is highly likely that macOS Big Sur and macOS Catalina are both vulnerable to CVE-2022-22674, the other actively exploited vulnerability that was fixed for only macOS Monterey last week.<\/span><\/p>\n<p>Intego is actively working to confirm that Big Sur and Catalina are affected. Unfortunately, Apple has neither issued a statement nor responded to our inquiries. Apple&#8217;s patch notes indicate that CVE-2022-22674 was reported by an &#8220;anonymous researcher,&#8221; making it difficult to independently and conclusively confirm whether the vulnerability affects previous macOS versions without reverse engineering Apple&#8217;s Monterey patch.<\/p>\n<p>However, <strong>we have high confidence that CVE-2022-22674 likely affects both macOS Big Sur and macOS Catalina.<\/strong> Nearly all vulnerabilities in the Intel Graphics Driver component in recent years have affected all versions of macOS.<\/p>\n<div id=\"attachment_95522\" style=\"width: 1090px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-95522\" loading=\"lazy\" class=\"size-full wp-image-95522\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities.png\" alt=\"\" width=\"1080\" height=\"640\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities.png 1080w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities-300x178.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities-1024x607.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities-768x455.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-intel-graphics-driver-vulnerabilities-657x389.png 657w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><p id=\"caption-attachment-95522\" class=\"wp-caption-text\">For reference, a list of Intel Graphics Driver vulnerabilities that Apple patched while Big Sur was the latest macOS. Apple&#8217;s patches indicate that nearly all Intel Graphics Driver vulnerabilities were present in all macOS versions. Credit: Intego.<\/p><\/div>\n<p>Until Apple&#8217;s Monterey patch for CVE-2022-22674 can be reverse-engineered, past experience is a strong indicator that the vulnerability is highly likely to be present in both Big Sur and Catalina. The lack of patches for these operating systems leaves them highly susceptible to attacks that target this actively exploited vulnerability.<a name=\"other-vulns\"><\/a><\/p>\n<h4><strong><br \/>\nOther vulnerabilities in Big Sur and Catalina<\/strong><\/h4>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\"><br \/>\nThe main focus of this article is to point out the existence of the two new, actively exploited vulnerabilities in macOS Big Sur and Catalina. However, it&#8217;s worth mentioning that there are also dozens of vulnerabilities that Apple has <em>not<\/em> identified as actively exploited, that remain in macOS Big Sur and Catalina.<\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Quick update: <a href=\"https:\/\/twitter.com\/hashtag\/Safari?src=hash&amp;ref_src=twsrc%5Etfw\">#Safari<\/a> 15.1 was released for Big Sur &amp; Catalina yesterday, &amp; its release notes indicate that 5 of the 7 <a href=\"https:\/\/twitter.com\/hashtag\/WebKit?src=hash&amp;ref_src=twsrc%5Etfw\">#WebKit<\/a> vulnerabilities were fixed. Two appear to remain unpatched for 11.x and 10.15.x: CVEs 2021-30823 (Gullasch <a href=\"https:\/\/twitter.com\/0x41414141?ref_src=twsrc%5Etfw\">@0x41414141<\/a>) &amp; 2021-30861 (<a href=\"https:\/\/twitter.com\/_r3ggi?ref_src=twsrc%5Etfw\">@_r3ggi<\/a> &amp; Pickren).<\/p>\n<p>&mdash; Josh Long (the\u00a0JoshMeister) (@theJoshMeister) <a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/1453841355176693760?ref_src=twsrc%5Etfw\">October 28, 2021<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>A preliminary assessment of just the first round of patches at macOS Monterey&#8217;s release in October 2021 indicated that there may have already been well over a dozen vulnerabilities that were not patched for previous macOS versions.<\/p>\n<p>Apple has never fully disclosed its patching policies for macOS. Apple once publicly <a href=\"https:\/\/support.apple.com\/en-us\/HT1646\" target=\"_blank\" rel=\"noopener\">commented<\/a>\u2014way back in 2003\u2014that &#8220;it is Apple&#8217;s policy to quickly address significant vulnerabilities in past releases of Mac OS X wherever feasible.&#8221; Since September 2012, Apple&#8217;s practice has been to release patches for the current and two previous major macOS versions, usually simultaneously. Only recently did Intego&#8217;s research bring to light Apple&#8217;s inconsistency and lack of parity between the company&#8217;s macOS security patches (more on this below).<a name=\"how-many-macs\"><\/a><\/p>\n<h3>How many Macs are affected by the new vulnerabilities?<\/h3>\n<p>We estimate that <strong>roughly 35\u201340% of all Macs in use today are likely affected by one or both of the new actively exploited vulnerabilities.<\/strong><\/p>\n<div id=\"attachment_95539\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-95539\" loading=\"lazy\" class=\"size-full wp-image-95539\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/approximate-macos-version-market-share-20220404.jpg\" alt=\"\" width=\"400\" height=\"400\" \/><p id=\"caption-attachment-95539\" class=\"wp-caption-text\">Best estimate of current macOS version market share.<\/p><\/div>\n<p>Apple has made it difficult to determine the current macOS version market share with precision. Since macOS Catalina, Apple no longer distinguishes between macOS versions in browser User Agent strings; all macOS versions, including Big Sur and Monterey, now self-identify to Web servers as Catalina. Our best estimates, therefore, are based on pre-Catalina (e.g. <a href=\"https:\/\/web.archive.org\/web\/20190422160306\/https:\/\/gs.statcounter.com\/macos-version-market-share\/desktop\/worldwide\" target=\"_blank\" rel=\"noopener\">2019<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20180406122732\/https:\/\/gs.statcounter.com\/macos-version-market-share\/desktop\/worldwide\" target=\"_blank\" rel=\"noopener\">2018<\/a>) macOS adoption rates around the same point in the OS release cycle.<\/p>\n<p>With these assumptions in mind, <strong>an estimated 55\u201360% of all actively used Macs today are likely running macOS Big Sur or older, and therefore remain vulnerable to unpatched in-the-wild vulnerabilities.<\/strong> Roughly two-thirds of that 55\u201360% (i.e. roughly 35\u201340% of all actively used Macs today) likely run either Big Sur or Catalina specifically.<\/p>\n<p>The only way to ensure that your Mac is as safe as possible from known vulnerabilities is to upgrade to macOS Monterey (assuming that your Mac is <a href=\"https:\/\/support.apple.com\/en-us\/HT212551\" target=\"_blank\" rel=\"noopener\">compatible with it<\/a>). The average person would never know this, because Apple still releases patches for Big Sur and Catalina (most recently just three weeks ago, on March 15); it isn&#8217;t obvious to most people that Apple&#8217;s patches for these macOS versions are incomplete and leave their Macs vulnerable to serious\u2014and in some cases actively exploited\u2014security bugs.<a name=\"happened-before\"><\/a><\/p>\n<h3>Has anything like this ever happened before?<\/h3>\n<p>This isn\u2019t the first time that we\u2019ve observed Apple neglecting to patch serious vulnerabilities, or even actively exploited ones.<\/p>\n<p>Last year, Intego&#8217;s Chief Security Analyst, Josh Long, did a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">deep-dive analysis<\/a> of macOS vulnerabilities addressed over a year&#8217;s worth of patches. At the time, macOS Big Sur was the latest Mac operating system.<\/p>\n<p>Long found that while approximately 48% of the over 400 vulnerabilities were patched for all three supported operating systems (which at the time were Big Sur, Catalina, and Mojave), about 16% were only patched for the current and the one previous (Big Sur and Catalina), and about 34% were only patched for the then-current macOS, Big Sur.<\/p>\n<p>Drilling down specifically into the 15 &#8220;actively exploited&#8221; vulnerabilities during that timeframe, Long found that six (40%) were patched for all three macOS versions, four (27%) were only patched for Big Sur and Catalina, and five (33%) were only patched for Big Sur, the then-latest version.<\/p>\n<div id=\"attachment_95534\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-95534\" loading=\"lazy\" class=\"size-full wp-image-95534\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/macos-big-sur-era-actively-exploited-vulnerabilities-chart.jpg\" alt=\"\" width=\"400\" height=\"400\" \/><p id=\"caption-attachment-95534\" class=\"wp-caption-text\">Chart of Big Sur-era actively exploited vulnerabilities. Apple has a history of leaving supported macOS versions in danger from actively exploited vulnerabilities. Credit: Intego.<\/p><\/div>\n<p>So, in fact, Apple has an unfortunate history of knowingly leaving &#8220;supported&#8221; macOS versions unprotected from some in-the-wild, actively exploited attacks. This type of scenario where a vendor chooses not to release a patch is sometimes referred to as a &#8220;perpetual zero-day.&#8221;<\/p>\n<p>We had hoped that Apple had since improved for the better, but the lack of patches for the current actively exploited vulnerabilities seem to indicate otherwise.<a name=\"faq\"><\/a><\/p>\n<h3>Frequently asked questions<\/h3>\n<p><strong>Q.<\/strong> Has Apple confirmed that Big Sur and Catalina are vulnerable?<br \/>\n<strong>A.<\/strong> No, Apple has not responded to any of our inquiries, and we don\u2019t expect that they will. Apple often ignores inquiries from press and security researchers.<br \/>\nHowever, <strong>we have confirmed that macOS Big Sur is indeed vulnerable to CVE-2022-22675<\/strong>, the actively exploited vulnerability in AppleAVD.<br \/>\n<strong>There is a strong likelihood that macOS Big Sur and macOS Catalina are both vulnerable to CVE-2022-22674<\/strong>, the actively exploited vulnerability in Intel Graphics Driver; most similar vulnerabilities found to date have affected every version of macOS.<\/p>\n<p><strong>Q.<\/strong> Does Apple plan to release updates for Big Sur and Catalina?<br \/>\n<strong>A.<\/strong> Apple has neither responded to our inquires nor made any public statement about this. We do not know whether or not Apple will eventually make a patch available for Big Sur or Catalina (either because Apple was already planning to, or due to public pressure resulting from this attention).<\/p>\n<p><strong>Q.<\/strong> Is there any indication of which threat actor or APT group has exploited these vulnerabilities? Are they related to the Russia-Ukraine conflict?<br \/>\n<strong>A.<\/strong> Apple does not make public statements about such details, and little information is available elsewhere. However, now that Apple has released patches for Monterey and iOS 15 that can be reverse-engineered, <strong>additional threat actors may attempt to exploit these vulnerabilities.<\/strong> This makes it all the more urgent for Apple to release patches for Big Sur and Catalina.<\/p>\n<p><strong>Q.<\/strong> Why else is this a serious problem?<br \/>\n<strong>A.<\/strong> <strong>Apple is providing a false sense of security<\/strong> by providing inconsistent security updates\u2014and <em>not<\/em> patching every highly critical (or even every zero-day) vulnerability\u2014for two widely used macOS versions comprising an estimated 35\u201340% of all Macs in use today. Apple has never publicly acknowledged that it neglects to patch all highly critical vulnerabilities in the two previous macOS versions.<\/p>\n<p><strong>Q. <\/strong>What is the purpose of drawing attention to this issue?<br \/>\n<strong>A. <\/strong>First, <strong>we hope to encourage Apple to make things right by patching the still-vulnerable \u201csupported\u201d macOS versions\u2014and continuing to do so proactively<\/strong> (without third parties like us having to call them out on it) in the future.<br \/>\nSecond, <strong>we hope to raise awareness among consumers and IT professionals<\/strong> that Apple&#8217;s current practices leave the two previous macOS versions vulnerable to serious security flaws, including ones actively exploited in the wild. Mac users should be aware that Apple&#8217;s security patches for the two previous macOS versions are inconsistent and incomplete, and thus it&#8217;s generally safest to use the most recent major edition of macOS (currently Monterey). Apple should, at minimum, clearly communicate this to its customers, but the company has never done so.<a name=\"learn-more\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional information about Intego&#8217;s past research into macOS vulnerabilities and Apple&#8217;s patching policies, see this related article: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple\u2019s Poor Patching Policies Potentially Make Users\u2019 Security and Privacy Precarious<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"tg3Y5IImKn\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=tg3Y5IImKn\" data-secret=\"tg3Y5IImKn\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices.<\/p>\n<p>In <a href=\"https:\/\/podcast.intego.com\/233\">episode 233<\/a>, Josh and Kirk discussed why iOS updates\u2014including ones containing critical security fixes for actively exploited vulnerabilities\u2014can take up to four weeks to roll out to users. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes!<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+5kNqvvCw?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.<\/p>\n","protected":false},"author":14,"featured_media":95562,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4627,4618,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T12:55:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-23T19:47:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Finder icon macOS Big Sur logo with sad face\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/\",\"name\":\"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#primaryimage\"},\"datePublished\":\"2022-04-05T12:55:58+00:00\",\"dateModified\":\"2023-09-23T19:47:58+00:00\",\"description\":\"Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina\",\"datePublished\":\"2022-04-05T12:55:58+00:00\",\"dateModified\":\"2023-09-23T19:47:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#webpage\"},\"wordCount\":2160,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png\",\"keywords\":[\"iOS 15\",\"macOS Monterey\",\"Vulnerabilities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/","og_locale":"en_US","og_type":"article","og_title":"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina - The Mac Security Blog","og_description":"Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2022-04-05T12:55:58+00:00","article_modified_time":"2023-09-23T19:47:58+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png","width":400,"height":260,"caption":"Finder icon macOS Big Sur logo with sad face"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/","name":"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#primaryimage"},"datePublished":"2022-04-05T12:55:58+00:00","dateModified":"2023-09-23T19:47:58+00:00","description":"Apple has chosen to leave Big Sur and Catalina (around 35 to 40 percent of all Macs) in danger of actively exploited vulnerabilities that have only been patched for macOS Monterey.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina","datePublished":"2022-04-05T12:55:58+00:00","dateModified":"2023-09-23T19:47:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#webpage"},"wordCount":2160,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png","keywords":["iOS 15","macOS Monterey","Vulnerabilities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/04\/Finder-icon-macOS-Big-Sur-sad-face-logo-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oQC","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95518"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95518"}],"version-history":[{"count":47,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95518\/revisions"}],"predecessor-version":[{"id":95913,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95518\/revisions\/95913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/95562"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}