{"id":96723,"date":"2022-12-22T16:04:21","date_gmt":"2022-12-23T00:04:21","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96723"},"modified":"2022-12-22T16:04:21","modified_gmt":"2022-12-23T00:04:21","slug":"microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/","title":{"rendered":"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46762\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-600x300.jpeg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Last week, on December 13, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\">Apple released security updates<\/a> for all of its currently supported operating systems, including all three recent versions of macOS. In total, at that time Apple named 36 vulnerabilities that it had patched in macOS Ventura, of which 23 were patched for macOS Monterey, and 20 for macOS Big Sur.<\/p>\n<p>But earlier this week, and again as recently as this morning, new details have come to light about what was patched in these updates, as well as other previous Apple updates. Here&#8217;s the full story\u2014including details you won&#8217;t find anywhere else.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#timeline\">Timeline of events<\/a><\/li>\n<li><a href=\"#bypass\">Microsoft discovers new Gatekeeper bypass vulnerability<\/a><\/li>\n<li><a href=\"#ventura13\">Apple updates security advisory for macOS Ventura 13.0<\/a><\/li>\n<li><a href=\"#dec13\">Apple updates security advisories for December 13 updates<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"timeline\"><\/a><\/li>\n<\/ul>\n<h3>Timeline of events<\/h3>\n<ul>\n<li><strong>July 27<\/strong> &#8211; Microsoft discovers new Gatekeeper bypass vulnerability; Apple later names it &#8220;CVE-2022-42821&#8221;<\/li>\n<li><strong>Late July<\/strong> &#8211; Microsoft develops Achilles proof-of-concept exploit and reports vulnerability to Apple<\/li>\n<li><strong>October 24<\/strong> &#8211; Apple patches vulnerability, but only for macOS Ventura 13.0, and makes no public mention of it<\/li>\n<li><strong>December 13<\/strong> &#8211; Apple patches vulnerability for macOS Monterey and Big Sur, and updates Ventura 13.0&#8217;s release notes to reveal it was patched previously<\/li>\n<li><strong>December 19<\/strong> &#8211; Microsoft publishes full details of its discovery of CVE-2022-42821 and development of Achilles PoC exploit<\/li>\n<li><strong>December 22<\/strong> &#8211; Apple adds additional (unrelated) vulnerability disclosures to release notes for macOS Ventura 13.0 and various software updates from December 13<a name=\"bypass\"><\/a><\/li>\n<\/ul>\n<h3>Microsoft discovers new Gatekeeper bypass vulnerability<\/h3>\n<p>One of the vulnerabilities that was patched in both macOS Monterey 12.6.2 and macOS Big Sur 11.7.2 last week had been silently patched in macOS Ventura 13 nearly two months earlier:<\/p>\n<blockquote><p><strong>BOM<br \/>\n<\/strong>Impact: An app may bypass Gatekeeper checks<br \/>\nDescription: A logic issue was addressed with improved checks.<br \/>\nCVE-2022-42821: Jonathan Bar Or of Microsoft<\/p><\/blockquote>\n<p>In a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/19\/gatekeepers-achilles-heel-unearthing-a-macos-vulnerability\/\" target=\"_blank\" rel=\"noopener\">new Microsoft report<\/a> released on December 19, Jonathan Bar Or revealed that Microsoft had discovered the vulnerability back on July 27, and shared it with Apple the same month.<\/p>\n<p>If a malicious app were to leverage this vulnerability, it could potentially bypass Apple&#8217;s Gatekeeper technology. Gatekeeper is supposed to prevent Mac malware and other untrusted software from being able to run.<\/p>\n<p>Microsoft says that it developed a proof-of-concept exploit dubbed &#8220;Achilles&#8221; to test the vulnerability.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-61210\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open.jpg\" alt=\"\" width=\"125\" height=\"129\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open.jpg 201w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open-146x150.jpg 146w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/><strong>This is not the first time that a Gatekeeper-bypass vulnerability has been discovered.<\/strong> Microsoft shared examples of half a dozen other such vulnerabilities that have been patched in recent years, including another from earlier in 2022, and three from 2021. We&#8217;ve previously covered various <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/gatekeeper\/\">other Gatekeeper bypasses<\/a> on The Mac Security Blog.<\/p>\n<p>Microsoft also noted that macOS Ventura&#8217;s optional new <a href=\"https:\/\/support.apple.com\/en-us\/HT212650\" target=\"_blank\" rel=\"noopener\">Lockdown Mode<\/a> feature does not prevent the exploitation of this vulnerability.<\/p>\n<p>The vulnerability&#8217;s discovery was inspired by reconsidering a past Gatekeeper bypass that Apple fixed in 2021. The new vulnerability leverages the persistence of file metadata using AppleDouble files, which are usually named with a &#8220;._&#8221; (dot-underscore) prefix and are hidden in the Finder by default, and Access Control Lists (ACLs).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\ud83e\udee0\u2620\ufe0f Gatekeeper, released over a decade ago (July 2012), is still trivial to bypass. <\/p>\n<p>Lovely research by <a href=\"https:\/\/twitter.com\/yo_yo_yo_jbo?ref_src=twsrc%5Etfw\">@yo_yo_yo_jbo<\/a>, (ab)uses AppleDouble &amp; ACLs to fully bypass Gatekeeper &#8230;again <a href=\"https:\/\/t.co\/De6zg5A71h\">https:\/\/t.co\/De6zg5A71h<\/a><\/p>\n<p>&mdash; Patrick Wardle (@patrickwardle) <a href=\"https:\/\/twitter.com\/patrickwardle\/status\/1605275574809001985?ref_src=twsrc%5Etfw\">December 20, 2022<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The relative triviality of circumventing built-in security features in macOS is a sobering reminder of why it&#8217;s important to use additional <a href=\"https:\/\/www.intego.com\/products\">Mac protection software<\/a> from a trusted developer like Intego.<\/p>\n<p>The full technical details of the Gatekeeper bypass vulnerability can be found in <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/19\/gatekeepers-achilles-heel-unearthing-a-macos-vulnerability\/\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s report<\/a>.<a name=\"ventura13\"><\/a><\/p>\n<h3>Apple updates security advisory for macOS Ventura 13.0<\/h3>\n<p>Interestingly, Apple had not previously disclosed the existence of the Gatekeeper bypass vulnerability patch in the original release of macOS Ventura on October 24. Instead, Apple opted to patch it silently at the time\u2014without any publicly acknowledgment. (As a reminder, it&#8217;s virtually <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">always safest to run the current major macOS version<\/a>.) Apple sometimes chooses to delay disclosing the fact that a vulnerability has been patched, particularly if the same vulnerability affects other operating systems that may not be patched until a later date. On December 13, Apple finally revised its existing <a href=\"https:\/\/support.apple.com\/en-us\/HT213488\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13 security update release notes<\/a> to add an entry about the vulnerability.<\/p>\n<p>In reviewing those release notes this morning (December 22), Intego noticed that Apple had just added four additional vulnerabilities to macOS Ventura 13.0&#8217;s security release notes today, disclosing that these vulnerabilities were also patched in Ventura&#8217;s initial release nearly two months ago on October 24:<\/p>\n<blockquote><p><strong>CoreMedia<br \/>\n<\/strong>Impact: A camera extension may be able to continue receiving video after the app which activated was closed<br \/>\nDescription: An issue with app access to camera data was addressed with improved logic.<br \/>\nCVE-2022-42838: Halle Winkler (@hallewinkler) of Politepix<\/p>\n<p>&nbsp;<\/p>\n<p><strong>GPU Drivers<br \/>\n<\/strong>Impact: An app may be able to execute arbitrary code with kernel privileges<br \/>\nDescription: An out-of-bounds read was addressed with improved input validation.<br \/>\nCVE-2022-42833: Pan ZhenPeng (@Peterpan0927)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit<br \/>\n<\/strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Impact: Processing maliciously crafted web content may lead to arbitrary code execution<br \/>\n<\/span>Description: A use after free issue was addressed with improved memory management.<br \/>\nWebKit Bugzilla: 246669<br \/>\nCVE-2022-42826: Francisco Alonso (@revskills)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit Storage<br \/>\n<\/strong><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Impact: An app may be able to bypass Privacy preferences<br \/>\n<\/span>Description: The issue was addressed with improved handling of caches.<br \/>\nCVE-2022-32833: Csaba Fitzl (@theevilbit) of Offensive Security, Jeff Johnson<\/p><\/blockquote>\n<p>This is the fifth time that Apple has retroactively added additional vulnerability disclosures to the macOS Ventura 13 security release notes in less than two months. After initially releasing the notes on October 24, Apple has quietly added entries on October 25, October 27, November 9, December 13, and December 22.<a name=\"dec13\"><\/a><\/p>\n<h3>Apple updates security advisories for December 13 updates<\/h3>\n<p>Apple also added additional vulnerability disclosures on December 22 to the release notes for several of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\">software updates released on December 13<\/a> that Intego covered here on The Mac Security Blog last week. Specifically, Apple added new entries to the security release notes for <a href=\"https:\/\/support.apple.com\/en-us\/HT213532\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13.1<\/a>, <a href=\"https:\/\/support.apple.com\/en-us\/HT213533\" target=\"_blank\" rel=\"noopener\">macOS Monterey 12.6.2<\/a>, <a href=\"https:\/\/support.apple.com\/en-us\/HT213534\" target=\"_blank\" rel=\"noopener\">macOS Big Sur 11.7.2<\/a>, <a href=\"https:\/\/support.apple.com\/en-us\/HT213537\" target=\"_blank\" rel=\"noopener\">Safari 16.2<\/a> for Monterey and Big Sur, and <a href=\"https:\/\/support.apple.com\/en-us\/HT213530\" target=\"_blank\" rel=\"noopener\">iOS 16.2 and iPadOS 16.2<\/a>. The vulnerabilities are as follows:<\/p>\n<blockquote><p><strong>PackageKit<br \/>\n<\/strong>Impact: An app may be able to modify protected parts of the file system<br \/>\nDescription: A logic issue was addressed with improved state management.<br \/>\nCVE-2022-46704: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Offensive Security<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit<br \/>\n<\/strong>Impact: Visiting a malicious website may lead to address bar spoofing<br \/>\nDescription: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.<br \/>\nCVE-2022-46705: Hyeon Park (@tree_segment) of ApplePIE<\/p><\/blockquote>\n<p>The PackageKit vulnerability was addressed in all three versions of macOS. The WebKit vulnerability was addressed for all macOS versions as well (directly in the Ventura 13.1 update, and via the Safari 16.2 update for Monterey and Big Sur), and was also addressed in iOS 16.2 and iPadOS 16.2.<\/p>\n<p>Additionally, <strong>Apple added a new entry to the iPadOS 16.2 release notes<\/strong> the morning of December 22 to confirm that an &#8220;actively exploited&#8221; vulnerability had, in fact, been addressed for iPads, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\">as we speculated about in our article last week<\/a>. Prior to the December 13 updates, Apple had issued an emergency patch exclusively for iPhones, namely iOS 16.1.2, on November 30, without a corresponding patch for iPads or other Apple devices at the time. Users of Macs, iPads, and Apple TVs had to wait almost an additional two weeks for the same patch:<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.<br \/>\nDescription: A type confusion issue was addressed with improved state handling.<br \/>\nCVE-2022-42856: Cl\u00e9ment Lecigne of Google&#8217;s Threat Analysis Group<\/p><\/blockquote>\n<p>It still remains unclear whether the vulnerability may have been applicable to, or silently patched in, watchOS 9.2 or iCloud for Windows 14.1. Apple patched other WebKit vulnerabilities in both of these software updates on December 13, but did not specify whether CVE-2022-42856 was applicable to, or patched in, those updates.<\/p>\n<p>If CVE-2022-42856 does impact watchOS 9, then it likely also impacts watchOS 8, which hasn&#8217;t been patched since August 17. Several vulnerabilities (at least two of which were actively exploited) remain unpatched for the Apple Watch Series 3, the lone model that cannot upgrade from watchOS 8 to 9. This is significant because <a href=\"https:\/\/www.apple.com\/shop\/refurbished\/watch\/apple-watch-series-3\" target=\"_blank\" rel=\"noopener\">Apple still sells the Apple Watch Series 3<\/a> (as a Certified Refurbished product) in its online store, in spite of its incompatibility with watchOS 9. Apple&#8217;s refurbished Series 3 sells for a whopping $369\u2014which is more expensive than, and vastly technologically inferior to, the Apple Watch SE model released this year which starts at $249 and can run the latest watchOS. Furthermore, Apple&#8217;s refurb Series 3 costs nearly as much as the five-generations-newer Series 8, which starts at $399 brand new.<\/p>\n<p>Apple has not responded to our requests for comment about the applicability or patch status of CVE-2022-42856 to watchOS 9, watchOS 8, or iCloud for Windows. We are also still awaiting any response from Apple regarding whether it plans to release further security updates for watchOS 8 for the Apple Watch Series 3 that it still sells.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional details about the Gatekeeper bypass vulnerability, see <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/19\/gatekeepers-achilles-heel-unearthing-a-macos-vulnerability\/\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s write-up<\/a>. You can also read our previous article covering <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\">other vulnerabilities that Apple patched on December 13<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"qcXKFpuAgl\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\">Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/embed\/#?secret=qcXKFpuAgl\" data-secret=\"qcXKFpuAgl\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>We talked about Apple&#8217;s latest operating system updates on <a href=\"https:\/\/podcast.intego.com\/271\">episode 271<\/a>:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+blVzQsrm?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.<\/p>\n","protected":false},"author":14,"featured_media":46768,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[2197,2500,69,4645,4589,4618,4643,115,201,143,4583],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-23T00:04:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Heimdall, Asgardian Gatekeeper (representing Apple's Mac macOS Gatekeeper feature)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\",\"name\":\"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#primaryimage\"},\"datePublished\":\"2022-12-23T00:04:21+00:00\",\"dateModified\":\"2022-12-23T00:04:21+00:00\",\"description\":\"This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories\",\"datePublished\":\"2022-12-23T00:04:21+00:00\",\"dateModified\":\"2022-12-23T00:04:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#webpage\"},\"wordCount\":1573,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg\",\"keywords\":[\"Apple Watch\",\"Gatekeeper\",\"iOS\",\"iOS 16\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Safari\",\"Security Updates\",\"Vulnerabilities\",\"watchOS\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories - The Mac Security Blog","og_description":"This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2022-12-23T00:04:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg","width":400,"height":260,"caption":"Heimdall, Asgardian Gatekeeper (representing Apple's Mac macOS Gatekeeper feature)"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/","name":"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#primaryimage"},"datePublished":"2022-12-23T00:04:21+00:00","dateModified":"2022-12-23T00:04:21+00:00","description":"This morning, Apple disclosed additional vulnerabilities that had been patched in several past security updates. On Monday, Microsoft disclosed details about a Gatekeeper bypass it discovered in July that Apple patched for Ventura in October and for Monterey and Big Sur last week.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories","datePublished":"2022-12-23T00:04:21+00:00","dateModified":"2022-12-23T00:04:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#webpage"},"wordCount":1573,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg","keywords":["Apple Watch","Gatekeeper","iOS","iOS 16","macOS Big Sur","macOS Monterey","macOS Ventura","Safari","Security Updates","Vulnerabilities","watchOS"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/gatekeeper-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pa3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96723"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96723"}],"version-history":[{"count":38,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96723\/revisions"}],"predecessor-version":[{"id":96764,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96723\/revisions\/96764"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/46768"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}