Hackers exploit macOS vulnerability to run malicious applications

October 7, 2022

Attackers are exploiting a macOS vulnerability tracked as CVE-2022-32910 to execute malicious applications. The bug is described as a logic issue that could allow an archive file to bypass Gatekeeper checks that were originally developed to ensure that only trusted software is running on the operating system.

According to Apple device management firm Jamf, the bug is rooted in the built-in Archive Utility and “could lead to the execution of an unsigned and unnotatized application without displaying security prompts to the user, by using a specially crafted archive.”

The vulnerability was discovered by Jamf researcher Ferdous Saljooki.

Jamf discovered that the Archive Utility fails to add the quarantine attribute to a folder “when extracting an archive containing two or more files or folders in its root directory.” Therefore, creating an archive file with the extension “exploit.app.zip,” can lead to a situation where an unarchived folder called “exploit.app.” is created.

Saljooki explained that after the process, the application in question “will bypass all Gatekeeper checks that allow unauthorized and/or unsigned binary to run.”

Although the vulnerability was announced on May 31, 2022, Apple claimed to have fixed the issue in macOS Big Sur 11.6.8 and Monterey 12.5, which were released in July 2022. Apple also revised the advisories released on October 4 to add an entry for the vulnerability.

The sources for this piece include an article in TheHackerNews.

Top Stories

Related Articles

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

March 23, 2026 David Shipley, co-host of Cybersecurity today is covering RSAC for Tech Newsday and Cybersecurity Today.  SAN FRANCISCO more...

March 23, 2026 The U.S. Federal Communications Commission has banned the import of all new foreign-made consumer routers following a more...

March 19, 2026 The FBI has gone back to purchasing commercially available data, including Americans’ location histories, to support federal more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn