{"id":142269,"date":"2022-07-16T02:23:12","date_gmt":"2022-07-16T07:23:12","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/07\/microsoft-details-app-sandbox-escape-bug-impacting-apple-ios-ipados-macos-devices"},"modified":"2022-07-16T02:23:12","modified_gmt":"2022-07-16T07:23:12","slug":"microsoft-details-app-sandbox-escape-bug-impacting-apple-ios-ipados-macos-devices","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/07\/microsoft-details-app-sandbox-escape-bug-impacting-apple-ios-ipados-macos-devices","title":{"rendered":"Microsoft Details App Sandbox Escape Bug Impacting Apple iOS, iPadOS, macOS Devices"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/microsoft-details-app-sandbox-escape-bug-impacting-apple-ios-ipados-macos-devices2.jpg\"><\/a><\/p>\n<p>Microsoft on Wednesday shed light on a now patched security vulnerability affecting Apple\u2019s operating systems that, if successfully exploited, could allow attackers to escalate device privileges and deploy malware.<\/p>\n<p>\u201cAn attacker could take advantage of this sandbox escape vulnerability to gain elevated privileges on the affected device or execute malicious commands like installing additional payloads,\u201d Jonathan Bar Or of the Microsoft 365 Defender Research Team <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/13\/uncovering-a-macos-app-sandbox-escape-vulnerability-a-deep-dive-into-cve-2022-26706\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a write-up.<\/p>\n<p>Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26706\" rel=\"noopener\" target=\"_blank\">CVE-2022\u201326706<\/a> (CVSS score: 5.5), the security vulnerability impacts iOS, iPadOS, macOS, tvOS, and watchOS and was fixed by Apple in May 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft on Wednesday shed light on a now patched security vulnerability affecting Apple\u2019s operating systems that, if successfully exploited, could allow attackers to escalate device privileges and deploy malware. \u201cAn attacker could take advantage of this sandbox escape vulnerability to gain elevated privileges on the affected device or execute malicious commands like installing additional payloads,\u201d [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-142269","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/142269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=142269"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/142269\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=142269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=142269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=142269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}