Apple’s Zero-Day 0-Click Critical Vulnerability CVE-2022-22620

CVE Trends is warning us that over the past week the latest Apple vulnerability has racked up nearly 6 million audience interactions on Twitter.

CVE-2022-22620: 6M
CVE-2022-24086: 3.2M
CVE-2021-44521: 2.9M

Source: CVE Trends

Very interesting to see such a long tail instead of the usual up and down audience curve. Anyone have a guess why this vulnerability is getting so much more audience?

Apple, per usual, is very tight-lipped about their emergency security patch, which has been credited to an anonymous researcher.

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Description: A use after free issue was addressed with improved memory management.

Alleged so far is that this marks a 0-day in Apple devices (exploited in the wild before the patch was released), easily hacked by clicking on just one link (1-click) or perhaps even less (0-click through waterholes, cross-site scripting, man-in-the-middle, captive portal, etc). It would be hard to allege anything higher risk, and that is surely generating attention.

It’s also probably safe to say that a 15.3.1 minor release just two weeks after ten major security fixes are announced in the 15.3 release (including in-the-wild 0-day patch of CVE-2022-22587 — code execution with kernel privileges)… all means this patch is even more unusually important.

Worth noting is that malware researchers are pulling the “UPDATE NOW” alarm, and CISA is similarly saying “we’ve added one more” the next day after publishing their latest “Known Exploited Vulnerabilities Catalog”.

…evidence that threat actors are actively exploiting the vulnerability… remediation due date: 2/25/2022 [only two weeks from Apple’s patch release]

Highly unusual to have a critical patch announcement dropped almost immediately on top of a critical patch announcement, forcing everyone in the US government to patch Apple devices basically right now instead of whatever else they have to think about. It doesn’t get any more serious than this one.

As a laugh I also have to give credit where due, as The Register apparently published on this vulnerability all the waaaay back in 1970!

Source: VulMon

Leave it to a vulnerability reporting site to have an obvious integrity flaw sitting out in the open like that.

And as another laugh, that Register article cites a ex-Google guy now a Microsoft browser program manager throwing stones from inside his glass house

Imagine, if you can, a world where installing an alternative browser as your default actually had a chance of protecting you from [a software company’s] shocking underinvestment in security

Indeed. Chrome on Google and Edge on Microsoft should be your last choice, given what we know about WebKit on Apple having issues. Another Google guy cited by The Register wants you to worry about Apple based on the following analysis:

Apple’s average repair time for iOS bugs is more or less the same and Google’s average repair time for Android – 70 and 72 days respectively. …”WebKit is the outlier in this analysis, with the longest number of days to release a patch at 73 days,” wrote Project Zero researcher Ryan Schoen.

“Outlier” seems rather strongly worded when looking at a spread of 70, 72 and 73. Confusingly, Ryan here is being represented as saying because Chrome is patched on a 30 day average then iOS should have its Webkit patched faster. That’s like comparing bananas and Apples.

Instead perhaps look at Project Zero Day like this:

Average Fix Time:
Android (72 days) versus iOS (70 days)
Chrome (30 days) versus Webkit (73 days)

The answer to why Webkit is slower than Chrome is really just a matter of how program managers are pushing releases, which Google admits in their analysis of Microsoft.

For Microsoft, we suspect that the high time to fix and Microsoft’s reliance on the grace period are consequences of the monthly cadence of Microsoft’s “patch Tuesday” updates, which can make it more difficult for development teams to meet a disclosure deadline. We hope that Microsoft might consider implementing a more frequent patch cadence for security issues, or finding ways to further streamline their internal processes to land and ship code quicker.

Related is the fact that Google security telling Google engineering to fix things faster under Google’s dubious business model is fundamentally different than when Google’s security team admits they don’t get how Microsoft and Apple do business (hint: it doesn’t involve *cough* anymore *cough* screwing customers with terrible safety).

And one big reason more people don’t flip to a Chrome security team’s ivory tower thinking of over-privileged control with its constant and rapid-release mentality is because of an old (perhaps wise and considerate) sentiment that you shouldn’t need to constantly fix things if you try to design them for some degree of stability that serves the needs of others.

This is expressed simply in the Linux community as a sliding spectrum from “daily” builds to “long term support” (LTS). Sometimes LTS will have an urgent patch, yet for most of the time it skips all the daily nonsense such as patches for patches that were just patched.

Of course I am not saying here that it’s somehow inherently right to — *gasp* — expect one month to go by without having to absorb cost of an update, but there does exist a world where you CAN’T update faster due to many environmental conditions well-known to scientists who care a lot about predictability and stability (e.g. launching exploratory missions into uncontrolled spaces).

Zero Hedge Caught Publishing Russian Intelligence Propaganda

Someone clearly thought it was important to very publicly call out a notoriously low-integrity American “news” source for being aligned with foreign military intelligence.

…officials said Zero Hedge, which has 1.2 million Twitter followers, published articles created by Moscow-controlled media that were then shared by outlets and people unaware of their nexus to Russian intelligence…

A tone-deaf response was then published by Zero Hedge, cited in the same article, which confirmed they knew they were spreading anti-American propaganda — as if an attack on truth (intentional lying) is a legitimate “side” for Zero Hedge to be on.

…publish a wide spectrum of views that cover both sides of a given story…

Wide spectrum? 2+2=5 is part of a “wide” spectrum. And “both sides” is a concept that invalidates “wide spectrum”, which I will explain in a minute.

First, this is like Zero Hedge saying “let’s hear from someone who denies basic math” as if that person needs help to spread obvious nonsense, increasing the cost of communication. Nobody really wants to hear 2+2=5 in their “spectrum” of news.

Someone who is actively doing wrong, someone who spreads intentional disinformation as part of a targeted military intelligence campaign, is being brought into the conversation because… why?

Second, in a spectrum you have many sides. However, if you cite “both sides” you negate the spectrum and force a binary. That’s a tactic to try to bring in a view that has been rejected, validate a side that doesn’t exist.

It is in fact a dog-whistle going back to at least the Civil War (if not WWII), which tries to promote obvious criminals and losers as deserving a voice and give them a chance to win after losing so obviously.

Let’s look at the Civil War for example. When Woodrow Wilson very clearly tried to re-write history, he claimed that the pro-slavery states starting a war to expand slavery weren’t doing the exact thing they had announced they were doing.

It was necessary [for the United States defending itself] to put the South at a moral disadvantage by transforming the contest from a war waged against states fighting for their independence into a war waged against states fighting for the maintenance and extension of slavery.

The “states fighting for their independence” wanted independence specifically “for the maintenance and extension of slavery.”

The South was at a moral disadvantage because it aspired to be nothing more than a white police state that profited almost exclusively from human trafficking.

Woodrow Wilson was a ruthless anti-American propagandist, evidenced by things like how he solicited Black votes to become President and then used his power to remove all Blacks from government and dilute or remove their voting rights.

Kind of similar to what Andrew Jackson did 100 years earlier, and kind of similar to what George Washington did 100 years before that. See the problem with “both sides” being an invitation to regression and mass casualties?

The opposite of the “both sides” propaganda of Woodrow Wilson was President Grant’s famous campaign slogan “Let Us Have Peace“, which asserted there was a proven right and moral side to American victory over its enemy in war.

In other words… stop saying maintenance and extension of slavery has any “sides” or arguments worth hearing. It is beyond the spectrum of acceptable views.

Both the ballot box and the battle field have settled the argument. Let us have peace.

Grant won his 1868 campaign for President in a huge landslide, defeating a “side” that literally ran on a platform called “this is a white man’s country”, which in retrospect obviously was not a side at all.

Logically speaking a “both sides” claim also floats towards a form of the “tu quoque” (you too, appeal to hypocrisy) logical fallacy. Instead of presenting a logical argument, “both sides” misdirects using false statements (e.g. alleging to be interested in a “wide spectrum of views” when in fact shifting attention to a very narrow and intentionally wrong one) to obfuscate and distract from accountability of making such false statements.

Military Ethics Flareup: Ground Troops Claim Superiority to Aerial Munitions

One of the greatest myths of American military history is that the nuclear bombs dropped on Japan were superior to sending ground troops.

In reality it was Soviet ground troops advancing on Japan that should be credited with an end to combat, given months of unrestricted aerial munitions by America (Tokyo 50% destroyed by non-stop napalm) had not delivered a surrender.

Technically the nuclear bombs gave the Japanese a diplomatic out — a public distraction — and thus did serve a purpose. The Japanese could use them to claim they cared about civilian deaths and claim they cared about American technology, when in fact they cared most about Soviet military encroachment and occupation.

It seems to me this is important backstory, let alone the failed bombing campaigns of Vietnam and North Korea, for Americans reading about a new dispute coming out of Syria.

If the al-Qurayshi home had been targeted in a similar aerial strike, the number of “acceptable” casualties would have been decided by a drone pilot and military lawyer, who would have made a judgment call as to when the number of civilians in the compound was low enough to justify a “proportional” strike.

Instead, the ground team was able to reduce the odds of collateral harm even further by clearing the area of some civilians in real time­ — first calling on them to evacuate and then assisting many in leaving their homes. Had al-Qurayshi not detonated his own explosive device, it is possible no civilians would have died.

While global data is scarce on the overall historical ratio of civilian casualties resulting from commando raids as compared to drone strikes, it stands to reason that in raids, armed actors are likelier to follow rules of engagement more associated with law enforcement or SWAT teams rather than urban warfare, and in doing so would take greater pains to protect innocent bystanders.

Indeed, US President Joe Biden has explained that he used ground troops rather than aerial munitions in the al-Qurayshi raid specifically for this purpose.

Italian Tax Police Raid Reveals Chinese Hand in Military Drone Maker

Tax resistance and evasion often is linked to intentional fight against transparency in “business” practices.

This played out recently when Italian “tax police” investigated a national security vendor and pulled a thread that went all the way to China.

The alarm was prompted by a raid last year by Italian tax police on Alpi Aviation, a firm in Pordenone in northern Italy which produces the Strix UAV.

Weighing 10kg with a three meter wingspan, the Strix can relay video and infrared imagery in real time and was used by Italy’s special forces in Afghanistan.

Investigators said a 75% share in the firm was purchased in 2018 at an inflated price by a Hong Kong-based company in turn controlled by Chinese state firms, which planned to transfer production to China.

The sale allegedly violated Italy’s “Golden Power” law, under which defense firms, as well as strategic companies, can only be sold outside Italy with specific permission from the government.

The tax police said the firm failed to notify the Italian government of the change in ownership, then also broke Italian law on defense exports by failing to inform the government when it temporarily exported a drone for display at a 2019 Shanghai trade fair.

A 75% share in the company at inflated prices… it must have smelled so bad that financial crimes enforcement had to act.

The Strix has the interesting design criteria to fit in a backpack and use an easily recognizable yet low-signature profile, obviously meant for combat or at least “non-recreational” objectives.

Source: Alpi
Source: Alpi