Apple has chosen to leave an estimated 35–40% of all supported Macs in danger of actively exploited vulnerabilities.
Last week, on March 31, Apple patched two “actively exploited” (i.e. in-the-wild, zero-day) security vulnerabilities for macOS Monterey.
After nearly a week, Apple still has not released corresponding security updates to address the same vulnerabilities in the two previous macOS versions, Big Sur (aka macOS 11) and Catalina (aka macOS 10.15)….
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Apple Neglects to Patch Two Zero-Day Vulnerabilities for Big Sur, Catalina
Home » Forums » AskWoody support » Apple » Apple operating systems » macOS » Apple Neglects to Patch Two Zero-Day Vulnerabilities for Big Sur, Catalina
- This topic has 12 replies, 3 voices, and was last updated 3 years, 1 month ago.
AuthorTopicAlex5723
AskWoody PlusApril 6, 2022 at 12:57 am #2437293Viewing 6 reply threadsAuthorReplies-
OscarCP
MemberApril 13, 2022 at 11:01 pm #2439273It is today two weeks, counting since March 31st, when Apple sent security updates to Monterey, because of two zero-day threats in the wild that it may not yet be clear if Catalina is vulnerable to and Big Sur is supposed to be vulnerable to at least one. But, as far as I know, no security updates have been sent for these two previous versions of macOS that are still fully supported.
This article from Intego, a company that for many years has provided AV and other protective software for Macs, came out a week ago and since then has been essentially the source informing most of the commentary in blogs and online articles on this issue of concern to many Mac users.
I came across this article thanks to Alex, that included the link to it in one of his own comments:
Another article on this very same issue:
Excerpt:
“Long [the author of the Intego article] says Intego was able to confirm that Big Sur is vulnerable to CVE-2022-22675 by reverse-engineering the patch that Apple released for the flaw for macOS Monterey.
“Catalina is not impacted by CVE-2022-22675 because it doesn’t have the affected component,” he says. Intego has not yet reversed-engineered the patch for CVE-2022-22674, so the company has not been able to confirm if the vulnerability is present in Big Sur and Catalina.
But it is very highly likely the vulnerability impacts those two operating systems as well. That’s because nearly every single vulnerability in the Intel Graphics Driver component in recent years has impacted all versions of macOS. There’s no reason to believe the present vulnerability is any different, according to Long.
Intego said that there are dozens of other vulnerabilities in Big Sur and Catalina that Apple has not addressed over the years.
Apple, like many other major software vendors, has had its share of criticism in the past over its patching practices and what many perceive as its reluctance to share detailed information on critical security issues. Last November, security vendor Malwarebytes slammed the company for taking some seven months to address a serious vulnerability in Catalina even though the flaw was being exploited for months. Malwarebytes described the incident as an example of Apple’s unreliability when it comes to fixing anything but the latest versions of its operating systems and software.”
So here are the two questions I have about this:
(1) Have the security updates for Catalina and Big Sur been already sent out by Apple, but it is taking some time for them to reach all users?
(2) If the answer to (1) is “no” and Apple has not yet explained the delay, would it be wiser:
(a) To wait some time longer.
Or
(b) To upgrade to Monterey as son as possible?
Thank you in advance for any practical and informed answers to these two questions.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
DrBonzo
AskWoody PlusApril 14, 2022 at 12:18 am #2439290I don’t have answers to your questions, just a few comments.
It strikes me that Apple is so secretive that no one other than Apple really knows if the vulnerabilities have been patched.
I get a bit suspicious when antivirus/security vendors start slamming Apple, Microsoft, Linux, etc for supposed vulnerabilities in their operating systems. It strikes me as a potential conflict of interest.
I get the impression that most articles and their authors assume that all macOS vulnerabilities will be patched with a security update, by which I mean those updates that are identified with something like Catalina Security Update 2022-003. But my understanding is that’s not always the case. My iMAC and MacBook Air from time to time get updates to MRTConfigData and XProtectPListConfigData both of which can be found under Installations. (Apple/About this Mac/System Report/Installations). The updates to these 2 happen automatically and the only way I know they’ve updated is to check Installations.
Unless Apple is sure the vulnerabilities can’t be exploited – or exploited only with great difficulty – they would be foolish to leave their operating systems knowingly vulnerable.
-
OscarCP
MemberApril 14, 2022 at 2:27 am #2439328DrBonzo: Following your suggestions, I just checked “Installations” in my Mac. The ones listed there for my current OS, Big Sur, are only the ones I have installed already.
Strangely enough, several Monterey updates are also listed there, the most recent dated April 1st of this year.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
DrBonzo
AskWoody PlusApril 14, 2022 at 2:39 am #2439332I’m running Catalina and when I go to Installations by the method I described above, I can see the Catalina Updates that I’ve installed, but I also see the the MRTConfigData and XProtectPListConfigData updates that have been installed automatically, i.e., not installed by me or with my approval. I also see a couple of Monterey updates although I think they’re called Monterey Installer.
-
OscarCP
MemberApril 14, 2022 at 3:45 am #2439355DrBonzo: “I also see a couple of Monterey updates although I think they’re called Monterey Installer.”
For what is worth, in my Mac these installations are actually called just “macOS Monterrey”, as shown here:
They all have the version number in the same line, the latest, 12.3.1, is the number of the latest Monterrey update and the date is 1st April. This, to me, is intriguing.
Maybe, as you wrote, these are successive updates of the application to install Monterey, but the application is called”install macOS Monterey.app”, not “macOS Monterey”. And it is not listed there, probably because it has not been installed, at least not by me. And I am the only user of this machine, that is still running Big Sur.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
anonymous
GuestApril 23, 2022 at 1:35 pm #2441341I made a thread earlier this year that involved an “Install macOS Monterey.app” being downloaded onto a Mac running Big Sur (a 12 GB download!) without permission from the user. Granted it doesn’t run without user consent, so no user will be forced to upgrade. I checked my installation log and saw “macOS Monterey” listed there as well, seemingly corresponding to each time macOS automatically downloaded the Monterey installer. This is despite the fact that I was running Big Sur the whole time, and never initiated the Monterey install.
Which is funny, because I just upgraded to Monterey a few days ago (this time under my own terms) and the install log also lists “macOS Monterey”—the exact same name and format—for the actual installation of Monterey!
I did also notice one other thing in the install log: an item called “macOS Installer Notification”, that predates all of those bizarre, unauthorized “Install macOS Monterey” downloads. Maybe that could be the culprit?
-
OscarCP
MemberApril 23, 2022 at 6:59 pm #2441409Anonymous: Until earlier this year still I had the “install.high.sierra.app” in my Mac, before I noticed it and deleted it. So this is not quite a new development.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV
-
-
-
-
Alex5723
AskWoody PlusApril 14, 2022 at 1:26 am #2439310Unless Apple is sure the vulnerabilities can’t be exploited – or exploited only with great difficulty – they would be foolish to leave their operating systems knowingly vulnerable.
Apple has confirmed these vulnerabilities are exploited in the wild.
1 user thanked author for this post.
OscarCP
MemberApril 14, 2022 at 1:52 am #2439321To me the statement by Joshua Long in the Intego article is something to take seriously, in particular:
“Intego was able to confirm that Big Sur is vulnerable to CVE-2022-22675 by reverse-engineering the patch that Apple released for the flaw for macOS Monterey”
This seems to be confirmed by Alex in his last comment here.
Alex, do you have a reference on this? I have not been able to find one when searching the Web to see if there were news coming out of Apple on this in the last few days.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AVOscarCP
MemberApril 14, 2022 at 7:53 pm #2439520Is the CISA doing something about this?
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AVOscarCP
MemberApril 14, 2022 at 9:37 pm #2439531Big Sur is not just used by individuals, like myself at home, but also by government agencies and companies. For example, at the NASA Center I work, those of us with Macs are still running Big Sur in them. I know, because I have a NASA-issue MacBook Pro running Big Sur to connect to the Center via VPN and do telecommuting work there, as well as to read and answer emails, etc.
I have asked about this and also have looked at NASA just now, for any announcements relevant to this, but seen no indications, so far, that at this Center at least, people are being told to move to Monterey, or that there are any rumors about such an impending move.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
OscarCP
MemberApril 18, 2022 at 6:08 pm #2440396Apple actually has a security patch 11.6.6 for Big Sur, in beta. It has been out for more than a week. The final version has not been released yet. Perhaps it still is being tested and debugged?
https://arstechnica.com/civis/viewtopic.php?f=19&t=1483611&view=unread
https://www.macworld.com/article/630407/macos-big-sur-11-6-6-security-updates.html
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
Viewing 6 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Apk on iphone (Awaiting moderation)
by
Calluum
39 minutes ago -
Are Macs immune?
by
Susan Bradley
3 hours, 53 minutes ago -
HP Envy and the Function keys
by
CWBillow
4 hours, 22 minutes ago -
Microsoft : Removal of unwanted drivers from Windows Update
by
Alex5723
5 hours, 46 minutes ago -
MacOS 26 beta 1 dropped support for Firewire 400/800
by
Alex5723
6 hours, 3 minutes ago -
Unable to update to version 22h2
by
04om
6 hours, 22 minutes ago -
Windows 11 Insider Preview Build 26100.4482 (24H2) released to Release Preview
by
joep517
13 hours, 31 minutes ago -
Windows 11 Insider Preview build 27881 released to Canary
by
joep517
13 hours, 33 minutes ago -
Very Quarrelsome Taskbar!
by
CWBillow
28 minutes ago -
Move OneNote Notebook OFF OneDrive and make it local
by
CWBillow
1 day, 2 hours ago -
Microsoft 365 to block file access via legacy auth protocols by default
by
Alex5723
15 hours, 15 minutes ago -
Is your battery draining?
by
Susan Bradley
8 hours, 22 minutes ago -
The 16-billion-record data breach that no one’s ever heard of
by
Alex5723
5 hours, 22 minutes ago -
Weasel Words Rule Too Many Data Breach Notifications
by
Nibbled To Death By Ducks
1 day, 6 hours ago -
Windows Command Prompt and Powershell will not open as Administrator
by
Gordski
14 hours, 27 minutes ago -
Intel Management Engine (Intel ME) Security Issue
by
PL1
14 hours, 39 minutes ago -
Old Geek Forced to Update. Buy a Win 11 PC? Yikes! How do I cope?
by
RonE22
7 hours, 19 minutes ago -
National scam day
by
Susan Bradley
14 hours, 12 minutes ago -
macOS Tahoe 26 the end of the road for Intel Macs, OCLP, Hackintosh
by
Alex5723
10 hours, 21 minutes ago -
Cyberattack on some Washington Post journalists’ email accounts
by
Bob99
2 days, 7 hours ago -
Tools to support internet discussions
by
Kathy Stevens
20 hours, 7 minutes ago -
How get Group Policy to allow specific Driver to download?
by
Tex265
1 day, 22 hours ago -
AI is good sometimes
by
Susan Bradley
2 days, 14 hours ago -
Mozilla quietly tests Perplexity AI as a New Firefox Search Option
by
Alex5723
2 days, 4 hours ago -
Perplexity Pro free for 12 mos for Samsung Galaxy phones
by
Patricia Grace
3 days, 14 hours ago -
June KB5060842 update broke DHCP server service
by
Alex5723
3 days, 13 hours ago -
AMD Ryzen™ Chipset Driver Release Notes 7.06.02.123
by
Alex5723
3 days, 17 hours ago -
Excessive security alerts
by
WSSebastian42
2 days, 8 hours ago -
* CrystalDiskMark may shorten SSD/USB Memory life
by
Alex5723
4 days, 2 hours ago -
Ben’s excellent adventure with Linux
by
Ben Myers
17 hours, 10 minutes ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.