### [CVE-2022-26706](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26706) ![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2012.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.5%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%208.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions&color=brighgreen) ### Description An access issue was addressed with additional sandbox restrictions on third-party applications. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A sandboxed process may be able to circumvent sandbox restrictions. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0x3c3e/pocs - https://github.com/ARPSyndicate/cvemon - https://github.com/Awrrays/Pentest-Tips - https://github.com/houjingyi233/macOS-iOS-system-security - https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io