Data Breach Threats

Exclusive: New Apple Zero Day Traded on the Dark Web

Exclusive: New Apple Zero Day Traded on the Dark Web

Recently there has been a lot of discussion about the two Apple vulnerabilities, which affect most of its devices, including macOS, iOS, iPadOS. 

The two vulnerabilities tracked as CVE-2022-32893 and CVE-2022-32894 allow RCE (Remote Code Execution) access and in some of the devices kernel permissions, which provide full and extensive permissions on the device. Both are related to the Safari WebKit web browser extension, and the OS kernel. Apple said it was aware of reports that both vulnerabilities may already have been actively exploited in the wild – making the need to patch more urgent.

By using our Cyber API, we have been able to exclusively trace another undetected, at the time of publication, Zero Day relating to one of the existing CVE – traded on the dark web.

But before we discuss that, let’s first understand the nature of these vulnerabilities.

What threats do the exposed CVEs pose to Apple users?

Let’s better understand the implication of these exploits:


This vulnerability is an RCE flaw affecting Apple’s Safari Web browser WebKit. 

Attack Method: An attacker could maliciously craft a web page, which if visited by a WebKit-powered browser, will lead to the execution of an unauthorized code on the device. 

Exposure/Risk level: High, since Webkit is the base engine that is used by any browsers on iOS and macOS, whether Safari, Chrome, or any other. This means that every Apple user is exposed to this vulnerability.

Affected Devices: iPhone 6 and later models, iPad Pro, iPad Air 2 onwards, iPad 5th generation and newer models, iPad mini 4 and newer versions, iPod touch (7th generation), and macOS Monterrey.


This vulnerability is another RCE but this time a kernel-level code execution, which requires initial access to the affected device, for example by using the CVE-2022-32893 to gain access to the remote device.

Attack Method: The attack is caused by an out-of-bounds write an issue and is addressed by improving the bounds checking of the vulnerable components.

Exposure level: Once the threat actor gains access and exploits the vulnerability, they could move from controlling just a single app on the device to taking over the OS and activating any app whether its camera, microphone, accessing all data on the device, and more.

Affected Devices: All devices mentioned above.

Now that we discussed the risk these CVEs pose to Apple users, let’s take a look at what we found on the dark web.

A new Apple Zero Day Vulnerability Traded on the Dark Web

A few days after the initial vulnerability was exposed, we were able to find a post in which a hacker is offering a new zero day around the same CVE-2022-32893 for €2.5 million.

This is what we consider to be a unique publication of a zero day, because it is rare that a hacker publicly sells zero day, especially related to a large enterprise such as Apple.

This specific hacker has a history of selling zero days for Apple and Android.

A threat actor is offering a zero day for an Apple vulnerability for  €2.5 million.

This does not come as a surprise as we have been able to see a higher level of activity on the dark web around the time the publication about the vulnerabilities. We ran a search of the two vulnerabilities by using our Dark Web API and this is what we found: 

Breakdown of the number of mentions of Apple CVEs per network

Most of the activity was around technical forums, some Telegram hacking channels, and image boards, even one mention of them on an alternative social platform.

In the image below you can see a discussion between hackers about CVE-2022-32893/4. Threat actors are trying to exploit the CVE as fast as possible. They are also looking for additional zero days around the already existing WebKit patch.

a discussion between hackers about CVE-2022-32893/4.

Were there early indications before the original Apple zero day vulnerabilities were found?

We used our cyber data feeds to search for indications around the WebKit and the out-of-bounds issue that was exploited including Kernel. We were able to find a pattern, in which in some cases, the discussion takes place even before the official publication of the CVE.

In many of the spikes you can see in the chart below, we were able to find early discussions between hackers about Webkit just before the CVEs were found, which means that they target a specific platform/system. This can serve as a valuable alert for organizations to proactively take measures and mitigate the potential threat. 

Malicious mentions of Webkit before recent CVEs were exposed’s Dark Web API provides the critical data needed to discover discussions around vulnerabilities, and the expertise to locate malicious activities ahead of time by finding new exploits for specific platforms traded or discussed on the deep and dark web.

Liran Sorani
Liran Sorani

Cyber Business Unit Manager

Spread the News

Not subscribed to our Dark Web Pulse updates?

By submitting you agree to's Privacy Policy and further marketing communications.

Feed Your Machines the Data They Need

Feed Your Machines the Data They Need


Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about’s solutions
Create your API account and get instant access to millions of web sources