Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-26724 (GCVE-0-2022-26724)
Vulnerability from cvelistv5
- A local user may be able to enable iCloud Photos without authentication
URL | Tags | ||
---|---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:11:44.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT213254" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "15.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "A local user may be able to enable iCloud Photos without authentication", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-26T18:55:06", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT213254" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-26724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.5" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A local user may be able to enable iCloud Photos without authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213254", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213254" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2022-26724", "datePublished": "2022-05-26T18:55:06", "dateReserved": "2022-03-08T00:00:00", "dateUpdated": "2024-08-03T05:11:44.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-26724\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2022-05-26T19:15:08.687\",\"lastModified\":\"2024-11-21T06:54:23.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication.\"},{\"lang\":\"es\",\"value\":\"Se abord\u00f3 un problema de autenticaci\u00f3n con una administraci\u00f3n de estados mejorada. Este problema es corregido en tvOS versi\u00f3n 15.5. Un usuario local puede ser capaz de habilitar Fotos de iCloud sin autenticaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.5\",\"matchCriteriaId\":\"4C98BE9E-8463-4CB9-8E42-A68DC0B20BD8\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/HT213254\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
fkie_cve-2022-26724
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | https://support.apple.com/en-us/HT213254 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213254 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C98BE9E-8463-4CB9-8E42-A68DC0B20BD8", "versionEndExcluding": "15.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication." }, { "lang": "es", "value": "Se abord\u00f3 un problema de autenticaci\u00f3n con una administraci\u00f3n de estados mejorada. Este problema es corregido en tvOS versi\u00f3n 15.5. Un usuario local puede ser capaz de habilitar Fotos de iCloud sin autenticaci\u00f3n" } ], "id": "CVE-2022-26724", "lastModified": "2024-11-21T06:54:23.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-26T19:15:08.687", "references": [ { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213254" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-39rg-8h92-xq56
Vulnerability from github
An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication.
{ "affected": [], "aliases": [ "CVE-2022-26724" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-05-26T19:15:00Z", "severity": "MODERATE" }, "details": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication.", "id": "GHSA-39rg-8h92-xq56", "modified": "2022-06-04T00:00:49Z", "published": "2022-05-27T00:00:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26724" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213254" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
CERTFR-2022-AVI-467
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Realtime Extension 15-SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Availability 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Module for Live Patching 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Module for Basesystem 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability 12-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "SUSE Manager Retail Branch Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Module for Development Tools 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "SUSE Linux Enterprise Live Patching", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time Extension 12-SP5", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Module for Realtime 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Software Development Kit 12-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12-SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15-SP3", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15-SP3", "product": { "name": "SUSE Linux Enterprise Real Time", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15-SP3", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12-SP5", "product": { "name": "SUSE Linux Enterprise High Performance Computing", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15-SP3", "product": { "name": "SUSE Linux Enterprise Server", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 12-SP5", "product": { "name": "SUSE Linux Enterprise Desktop", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Realtime Extension 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 12-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-26701", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26701" }, { "name": "CVE-2022-26722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26722" }, { "name": "CVE-2022-26769", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26769" }, { "name": "CVE-2022-26761", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26761" }, { "name": "CVE-2021-4192", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4192" }, { "name": "CVE-2022-26751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26751" }, { "name": "CVE-2022-26702", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26702" }, { "name": "CVE-2022-26693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26693" }, { "name": "CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "name": "CVE-2022-26753", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26753" }, { "name": "CVE-2022-26763", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26763" }, { "name": "CVE-2022-26776", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26776" }, { "name": "CVE-2022-26772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26772" }, { "name": "CVE-2021-4173", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4173" }, { "name": "CVE-2022-26756", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26756" }, { "name": "CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "name": "CVE-2022-26766", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26766" }, { "name": "CVE-2022-26744", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26744" }, { "name": "CVE-2022-26770", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26770" }, { "name": "CVE-2022-26739", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26739" }, { "name": "CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "name": "CVE-2022-26723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26723" }, { "name": "CVE-2022-22674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22674" }, { "name": "CVE-2022-26760", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26760" }, { "name": "CVE-2022-26754", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26754" }, { "name": "CVE-2021-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4136" }, { "name": "CVE-2022-26740", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26740" }, { "name": "CVE-2022-26762", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26762" }, { "name": "CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "name": "CVE-2022-26708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26708" }, { "name": "CVE-2022-24765", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24765" }, { "name": "CVE-2022-26711", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26711" }, { "name": "CVE-2022-26764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26764" }, { "name": "CVE-2022-26765", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26765" }, { "name": "CVE-2022-26775", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26775" }, { "name": "CVE-2021-4166", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4166" }, { "name": "CVE-2022-0128", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0128" }, { "name": "CVE-2022-26742", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26742" }, { "name": "CVE-2022-22665", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22665" }, { "name": "CVE-2022-0530", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0530" }, { "name": "CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "name": "CVE-2022-22673", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22673" }, { "name": "CVE-2022-26768", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26768" }, { "name": "CVE-2021-4193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193" }, { "name": "CVE-2022-26738", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26738" }, { "name": "CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "name": "CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "name": "CVE-2022-22675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22675" }, { "name": "CVE-2022-26720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26720" }, { "name": "CVE-2022-26698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26698" }, { "name": "CVE-2022-26748", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26748" }, { "name": "CVE-2022-26749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26749" }, { "name": "CVE-2022-26714", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26714" }, { "name": "CVE-2022-26747", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26747" }, { "name": "CVE-2022-26726", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26726" }, { "name": "CVE-2022-22719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719" }, { "name": "CVE-2022-26704", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26704" }, { "name": "CVE-2022-26755", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26755" }, { "name": "CVE-2022-26725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26725" }, { "name": "CVE-2021-45444", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45444" }, { "name": "CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "name": "CVE-2022-22663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22663" }, { "name": "CVE-2022-26721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26721" }, { "name": "CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "name": "CVE-2022-26741", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26741" }, { "name": "CVE-2022-26728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26728" }, { "name": "CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "name": "CVE-2021-44224", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44224" }, { "name": "CVE-2022-26743", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26743" }, { "name": "CVE-2022-26727", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26727" }, { "name": "CVE-2022-26737", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26737" }, { "name": "CVE-2022-26736", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26736" }, { "name": "CVE-2022-26715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26715" }, { "name": "CVE-2022-26731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26731" }, { "name": "CVE-2022-26767", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26767" }, { "name": "CVE-2022-26771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26771" }, { "name": "CVE-2015-4142", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4142" }, { "name": "CVE-2022-26724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26724" }, { "name": "CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "name": "CVE-2022-26752", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26752" }, { "name": "CVE-2022-26706", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26706" }, { "name": "CVE-2021-4187", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4187" }, { "name": "CVE-2022-26750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26750" }, { "name": "CVE-2021-46059", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46059" }, { "name": "CVE-2022-26745", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26745" }, { "name": "CVE-2022-26746", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26746" }, { "name": "CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "name": "CVE-2022-26712", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26712" }, { "name": "CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "name": "CVE-2022-26718", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26718" }, { "name": "CVE-2022-26694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26694" }, { "name": "CVE-2022-26703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26703" }, { "name": "CVE-2022-26697", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26697" }, { "name": "CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "name": "CVE-2022-26757", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26757" } ], "initial_release_date": "2022-05-17T00:00:00", "last_revision_date": "2022-05-17T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-467", "revisions": [ { "description": "Version initiale", "revision_date": "2022-05-17T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20221686-1 du 16 mai 2022", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221686-1/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20221669-1 du 16 mai 2022", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221669-1/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20221668-1 du 16 mai 2022", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221668-1/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20221687-1 du 16 mai 2022", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221687-1/" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20221676-1 du 16 mai 2022", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221676-1/" } ] }
CERTFR-2022-AVI-466
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Apple | N/A | Apple iOS versions antérieures à 15.5 | ||
Apple | macOS | Apple macOS Monterey versions antérieures à 12.4 | ||
Apple | N/A | Apple tvOS versions antérieures à 15.5 | ||
Apple | Safari | Apple Safari versions antérieures à 15.5 | ||
Apple | N/A | Apple watchOS versions antérieures à 8.6 | ||
Apple | N/A | Apple Xcode versions antérieures à 13.4 | ||
Apple | macOS | Apple macOS Catalina versions antérieures à 2022-004 | ||
Apple | N/A | Apple iPadOS versions antérieures à 15.5 | ||
Apple | macOS | Apple macOS Big Sur versions antérieures à 11.6.6 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Apple iOS versions ant\u00e9rieures \u00e0 15.5", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple macOS Monterey versions ant\u00e9rieures \u00e0 12.4", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple tvOS versions ant\u00e9rieures \u00e0 15.5", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple Safari versions ant\u00e9rieures \u00e0 15.5", "product": { "name": "Safari", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple watchOS versions ant\u00e9rieures \u00e0 8.6", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple Xcode versions ant\u00e9rieures \u00e0 13.4", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple macOS Catalina versions ant\u00e9rieures \u00e0 2022-004", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple iPadOS versions ant\u00e9rieures \u00e0 15.5", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple macOS Big Sur versions ant\u00e9rieures \u00e0 11.6.6", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-26701", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26701" }, { "name": "CVE-2022-26722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26722" }, { "name": "CVE-2022-26769", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26769" }, { "name": "CVE-2022-26761", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26761" }, { "name": "CVE-2021-4192", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4192" }, { "name": "CVE-2022-26751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26751" }, { "name": "CVE-2022-26702", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26702" }, { "name": "CVE-2022-26693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26693" }, { "name": "CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "name": "CVE-2022-26753", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26753" }, { "name": "CVE-2022-26763", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26763" }, { "name": "CVE-2022-26776", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26776" }, { "name": "CVE-2022-26772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26772" }, { "name": "CVE-2021-4173", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4173" }, { "name": "CVE-2022-26756", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26756" }, { "name": "CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "name": "CVE-2022-26766", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26766" }, { "name": "CVE-2022-26744", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26744" }, { "name": "CVE-2022-26770", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26770" }, { "name": "CVE-2022-26739", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26739" }, { "name": "CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "name": "CVE-2022-26723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26723" }, { "name": "CVE-2022-22674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22674" }, { "name": "CVE-2022-26760", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26760" }, { "name": "CVE-2022-26754", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26754" }, { "name": "CVE-2021-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4136" }, { "name": "CVE-2022-26740", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26740" }, { "name": "CVE-2022-26762", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26762" }, { "name": "CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "name": "CVE-2022-26708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26708" }, { "name": "CVE-2022-24765", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24765" }, { "name": "CVE-2022-26711", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26711" }, { "name": "CVE-2022-26764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26764" }, { "name": "CVE-2022-26765", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26765" }, { "name": "CVE-2022-26775", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26775" }, { "name": "CVE-2021-4166", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4166" }, { "name": "CVE-2022-0128", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0128" }, { "name": "CVE-2022-26742", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26742" }, { "name": "CVE-2022-22665", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22665" }, { "name": "CVE-2022-0530", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0530" }, { "name": "CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "name": "CVE-2022-22673", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22673" }, { "name": "CVE-2022-26768", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26768" }, { "name": "CVE-2021-4193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193" }, { "name": "CVE-2022-26738", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26738" }, { "name": "CVE-2018-25032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032" }, { "name": "CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "name": "CVE-2022-22675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22675" }, { "name": "CVE-2022-26720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26720" }, { "name": "CVE-2022-26698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26698" }, { "name": "CVE-2022-26748", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26748" }, { "name": "CVE-2022-26749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26749" }, { "name": "CVE-2022-26714", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26714" }, { "name": "CVE-2022-26747", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26747" }, { "name": "CVE-2022-26726", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26726" }, { "name": "CVE-2022-22719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719" }, { "name": "CVE-2022-26704", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26704" }, { "name": "CVE-2022-26755", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26755" }, { "name": "CVE-2022-26725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26725" }, { "name": "CVE-2021-45444", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45444" }, { "name": "CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "name": "CVE-2022-22663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22663" }, { "name": "CVE-2022-26721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26721" }, { "name": "CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "name": "CVE-2022-26741", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26741" }, { "name": "CVE-2022-26728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26728" }, { "name": "CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "name": "CVE-2021-44224", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44224" }, { "name": "CVE-2022-26743", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26743" }, { "name": "CVE-2022-26727", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26727" }, { "name": "CVE-2022-26737", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26737" }, { "name": "CVE-2022-26736", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26736" }, { "name": "CVE-2022-26715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26715" }, { "name": "CVE-2022-26731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26731" }, { "name": "CVE-2022-26767", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26767" }, { "name": "CVE-2022-26771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26771" }, { "name": "CVE-2015-4142", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4142" }, { "name": "CVE-2022-26724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26724" }, { "name": "CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "name": "CVE-2022-26752", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26752" }, { "name": "CVE-2022-26706", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26706" }, { "name": "CVE-2021-4187", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4187" }, { "name": "CVE-2022-26750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26750" }, { "name": "CVE-2021-46059", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46059" }, { "name": "CVE-2022-26745", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26745" }, { "name": "CVE-2022-26746", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26746" }, { "name": "CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "name": "CVE-2022-26712", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26712" }, { "name": "CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "name": "CVE-2022-26718", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26718" }, { "name": "CVE-2022-26694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26694" }, { "name": "CVE-2022-26703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26703" }, { "name": "CVE-2022-26697", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26697" }, { "name": "CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "name": "CVE-2022-26757", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26757" } ], "initial_release_date": "2022-05-17T00:00:00", "last_revision_date": "2022-05-17T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-466", "revisions": [ { "description": "Version initiale", "revision_date": "2022-05-17T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213257 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213257" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213255 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213255" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213261 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213261" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213256 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213256" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213253 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213253" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213254 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213254" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213258 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213258" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT213260 du 16 mai 2022", "url": "https://support.apple.com/fr-fr/HT213260" } ] }
var-202205-1300
Vulnerability from variot
An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication. tvOS There is an authentication vulnerability in.Information may be tampered with. Apple tvOS is a smart TV operating system developed by Apple (Apple). There is an authorization problem vulnerability in Apple tvOS. The vulnerability stems from the improper permission management of AuthKit. Local attackers can use this vulnerability to bypass the authentication process. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2022-05-16-6 tvOS 15.5
tvOS 15.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213254.
AppleAVD Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-26702: an anonymous researcher
AppleAVD Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. CVE-2022-22675: an anonymous researcher
AuthKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A local user may be able to enable iCloud Photos without authentication Description: An authentication issue was addressed with improved state management. CVE-2022-26724: Jorge A. Caballero (@DataDrivenMD)
AVEVideoEncoder Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-26736: an anonymous researcher CVE-2022-26737: an anonymous researcher CVE-2022-26738: an anonymous researcher CVE-2022-26739: an anonymous researcher CVE-2022-26740: an anonymous researcher
DriverKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2022-26763: Linus Henze of Pinauten GmbH (pinauten.de)
ImageIO Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow was addressed with improved input validation. CVE-2022-26711: actae0n of Blacksun Hackers Club working with Trend Micro Zero Day Initiative
IOKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-26701: chenyuwang (@mzzzz__) of Tencent Security Xuanwu Lab
IOMobileFrameBuffer Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2022-26768: an anonymous researcher
IOSurfaceAccelerator Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2022-26771: an anonymous researcher
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved validation. CVE-2022-26714: Peter Nguyễn Vũ Hoàng (@peternguyen14) of STAR Labs (@starlabs_sg)
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-26757: Ned Williamson of Google Project Zero
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations Description: A memory corruption issue was addressed with improved validation. CVE-2022-26764: Linus Henze of Pinauten GmbH (pinauten.de)
Kernel Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication Description: A race condition was addressed with improved state handling. CVE-2022-26765: Linus Henze of Pinauten GmbH (pinauten.de)
LaunchServices Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions on third-party applications. CVE-2022-26706: Arsenii Kostromin (0x3c3e)
libxml2 Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2022-23308
Security Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A malicious app may be able to bypass signature validation Description: A certificate parsing issue was addressed with improved checks. CVE-2022-26766: Linus Henze of Pinauten GmbH (pinauten.de)
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing maliciously crafted web content may lead to code execution Description: A memory corruption issue was addressed with improved state management. WebKit Bugzilla: 238178 CVE-2022-26700: ryuzaki
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 236950 CVE-2022-26709: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua wingtecher lab WebKit Bugzilla: 237475 CVE-2022-26710: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua wingtecher lab WebKit Bugzilla: 238171 CVE-2022-26717: Jeonghoon Shin of Theori
WebKit Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. WebKit Bugzilla: 238183 CVE-2022-26716: SorryMybad (@S0rryMybad) of Kunlun Lab WebKit Bugzilla: 238699 CVE-2022-26719: Dongzhuo Zhao working with ADLab of Venustech
Wi-Fi Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: A malicious application may disclose restricted memory Description: A memory corruption issue was addressed with improved validation. CVE-2022-26745: an anonymous researcher
Additional recognition
AppleMobileFileIntegrity We would like to acknowledge Wojciech Reguła (@_r3ggi) of SecuRing for their assistance.
WebKit We would like to acknowledge James Lee, an anonymous researcher for their assistance.
Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmKC1TcACgkQeC9qKD1p rhiw7BAAy82XZ2+vjnjFB1FrZ7ZnKtM4pz8MMpX4ZTD2ytgkwXi0qnyzBdMe/w4p zrpedL4p/RfdDOiM/4kWBtiH62qetiXDcE8tBqN8WTE9rf55cX4jlXrHASohFI2q ErkAjo51j2fg8S7a+luyaZWzBUZqlghtzWjtFgaHOQAP5dDf+He92kDerbrIDQw9 dg0nL4os0VFgWdX0EtFC7umK8iiTFbvtoEbLDLFODWweaJN8LOP/LHe71YzAryKg Dh9ItWqVdzkCOKWR8F96NnoBs7c6B4naqQkS4k2F/m6C6ckPb8LI18ss7oiD3eMB k7oo7+u1zQFRKmk0XlfH7awxtEHjYjjw3LT8ko9QJ8mEuspxoiwW7n1mINWa7Khp YoCe88xR06kfti4h6MJDSN6JpxSnikEyJzR4j4xGL6rWjqCj+XV9ejrt9EgF8BL2 JZ+Oceoh23m7IqVoMe1Hzjf1X3nsxXJQEg/xxRwHRknAjSNtVJUKhT4/ioOc9pu6 TROAHYdSO5yRLNUNpj9RlkBeDbXtiWgA2IEg0wcUPzwf3Uzt2Qw9zBFbMb1hPSht 7zTIOtF4Ub+MD6cFuHbC7hL58pRmA4FzEczLG81BoGGaFOCD2QDt0/ySTFr1M+YD g2L2PlZNgxd0zetkTkZbvAwroMUTRSi1GqxAhVeKwbvW4XAN+yc= =G3ho -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1300", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "15.5" }, { "model": "tvos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "15.5" }, { "model": "tvos", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "tvos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "NVD", "id": "CVE-2022-26724" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "167194" } ], "trust": 0.1 }, "cve": "CVE-2022-26724", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-26724", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-417393", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-26724", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-26724", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26724", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-26724", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202205-3477", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-417393", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-26724", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-417393" }, { "db": "VULMON", "id": "CVE-2022-26724" }, { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "CNNVD", "id": "CNNVD-202205-3477" }, { "db": "NVD", "id": "CVE-2022-26724" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication. tvOS There is an authentication vulnerability in.Information may be tampered with. Apple tvOS is a smart TV operating system developed by Apple (Apple). There is an authorization problem vulnerability in Apple tvOS. The vulnerability stems from the improper permission management of AuthKit. Local attackers can use this vulnerability to bypass the authentication process. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2022-05-16-6 tvOS 15.5\n\ntvOS 15.5 addresses the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT213254. \n\nAppleAVD\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-26702: an anonymous researcher\n\nAppleAVD\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges. Apple is aware of a report that this issue may\nhave been actively exploited. \nCVE-2022-22675: an anonymous researcher\n\nAuthKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A local user may be able to enable iCloud Photos without\nauthentication\nDescription: An authentication issue was addressed with improved\nstate management. \nCVE-2022-26724: Jorge A. Caballero (@DataDrivenMD)\n\nAVEVideoEncoder\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2022-26736: an anonymous researcher\nCVE-2022-26737: an anonymous researcher\nCVE-2022-26738: an anonymous researcher\nCVE-2022-26739: an anonymous researcher\nCVE-2022-26740: an anonymous researcher\n\nDriverKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A malicious application may be able to execute arbitrary code\nwith system privileges\nDescription: An out-of-bounds access issue was addressed with\nimproved bounds checking. \nCVE-2022-26763: Linus Henze of Pinauten GmbH (pinauten.de)\n\nImageIO\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow was addressed with improved input\nvalidation. \nCVE-2022-26711: actae0n of Blacksun Hackers Club working with Trend\nMicro Zero Day Initiative\n\nIOKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition was addressed with improved locking. \nCVE-2022-26701: chenyuwang (@mzzzz__) of Tencent Security Xuanwu Lab\n\nIOMobileFrameBuffer\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2022-26768: an anonymous researcher\n\nIOSurfaceAccelerator\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2022-26771: an anonymous researcher\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2022-26714: Peter Nguy\u1ec5n V\u0169 Ho\u00e0ng (@peternguyen14) of STAR Labs\n(@starlabs_sg)\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-26757: Ned Williamson of Google Project Zero\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: An attacker that has already achieved kernel code execution\nmay be able to bypass kernel memory mitigations\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2022-26764: Linus Henze of Pinauten GmbH (pinauten.de)\n\nKernel\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A malicious attacker with arbitrary read and write capability\nmay be able to bypass Pointer Authentication\nDescription: A race condition was addressed with improved state\nhandling. \nCVE-2022-26765: Linus Henze of Pinauten GmbH (pinauten.de)\n\nLaunchServices\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with additional sandbox\nrestrictions on third-party applications. \nCVE-2022-26706: Arsenii Kostromin (0x3c3e)\n\nlibxml2\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-23308\n\nSecurity\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A malicious app may be able to bypass signature validation\nDescription: A certificate parsing issue was addressed with improved\nchecks. \nCVE-2022-26766: Linus Henze of Pinauten GmbH (pinauten.de)\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing maliciously crafted web content may lead to code\nexecution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nWebKit Bugzilla: 238178\nCVE-2022-26700: ryuzaki\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nWebKit Bugzilla: 236950\nCVE-2022-26709: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua\nwingtecher lab\nWebKit Bugzilla: 237475\nCVE-2022-26710: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua\nwingtecher lab\nWebKit Bugzilla: 238171\nCVE-2022-26717: Jeonghoon Shin of Theori\n\nWebKit\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nWebKit Bugzilla: 238183\nCVE-2022-26716: SorryMybad (@S0rryMybad) of Kunlun Lab\nWebKit Bugzilla: 238699\nCVE-2022-26719: Dongzhuo Zhao working with ADLab of Venustech\n\nWi-Fi\nAvailable for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple\nTV HD\nImpact: A malicious application may disclose restricted memory\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2022-26745: an anonymous researcher\n\nAdditional recognition\n\nAppleMobileFileIntegrity\nWe would like to acknowledge Wojciech Regu\u0142a (@_r3ggi) of SecuRing\nfor their assistance. \n\nWebKit\nWe would like to acknowledge James Lee, an anonymous researcher for\ntheir assistance. \n\nApple TV will periodically check for software updates. Alternatively,\nyou may manually check for software updates by selecting \"Settings -\u003e\nSystem -\u003e Software Update -\u003e Update Software.\" To check the current\nversion of software, select \"Settings -\u003e General -\u003e About.\"\nAll information is also posted on the Apple Security Updates\nweb site: https://support.apple.com/en-us/HT201222. \n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\ng2L2PlZNgxd0zetkTkZbvAwroMUTRSi1GqxAhVeKwbvW4XAN+yc=\n=G3ho\n-----END PGP SIGNATURE-----\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2022-26724" }, { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "VULHUB", "id": "VHN-417393" }, { "db": "VULMON", "id": "CVE-2022-26724" }, { "db": "PACKETSTORM", "id": "167194" } ], "trust": 1.89 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-417393", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-417393" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26724", "trust": 3.5 }, { "db": "PACKETSTORM", "id": "167194", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-011172", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.2409", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022051708", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202205-3477", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-63642", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-417393", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-26724", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-417393" }, { "db": "VULMON", "id": "CVE-2022-26724" }, { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "PACKETSTORM", "id": "167194" }, { "db": "CNNVD", "id": "CNNVD-202205-3477" }, { "db": "NVD", "id": "CVE-2022-26724" } ] }, "id": "VAR-202205-1300", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-417393" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:11:07.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT213254 Apple\u00a0 Security update", "trust": 0.8, "url": "https://support.apple.com/en-us/HT213254" }, { "title": "Apple TV Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194655" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "CNNVD", "id": "CNNVD-202205-3477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-417393" }, { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "NVD", "id": "CVE-2022-26724" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://support.apple.com/en-us/ht213254" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26724" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26724/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2409" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022051708" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/167194/apple-security-advisory-2022-05-16-6.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26719" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26701" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26738" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26740" }, { "trust": 0.1, "url": "https://support.apple.com/ht213254." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26714" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26766" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26709" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26702" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26764" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26717" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26737" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26745" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26700" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26765" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26716" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26757" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22675" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26706" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26710" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26739" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26763" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26711" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26768" }, { "trust": 0.1, "url": "https://support.apple.com/en-us/ht201222." } ], "sources": [ { "db": "VULHUB", "id": "VHN-417393" }, { "db": "VULMON", "id": "CVE-2022-26724" }, { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "PACKETSTORM", "id": "167194" }, { "db": "CNNVD", "id": "CNNVD-202205-3477" }, { "db": "NVD", "id": "CVE-2022-26724" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-417393" }, { "db": "VULMON", "id": "CVE-2022-26724" }, { "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "db": "PACKETSTORM", "id": "167194" }, { "db": "CNNVD", "id": "CNNVD-202205-3477" }, { "db": "NVD", "id": "CVE-2022-26724" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-26T00:00:00", "db": "VULHUB", "id": "VHN-417393" }, { "date": "2022-05-26T00:00:00", "db": "VULMON", "id": "CVE-2022-26724" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "date": "2022-05-17T17:06:48", "db": "PACKETSTORM", "id": "167194" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3477" }, { "date": "2022-05-26T19:15:08.687000", "db": "NVD", "id": "CVE-2022-26724" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-03T00:00:00", "db": "VULHUB", "id": "VHN-417393" }, { "date": "2022-06-03T00:00:00", "db": "VULMON", "id": "CVE-2022-26724" }, { "date": "2023-08-21T01:41:00", "db": "JVNDB", "id": "JVNDB-2022-011172" }, { "date": "2022-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3477" }, { "date": "2024-11-21T06:54:23.400000", "db": "NVD", "id": "CVE-2022-26724" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "tvOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011172" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3477" } ], "trust": 0.6 } }
cnvd-2022-63642
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://support.apple.com/en-us/HT213254
Name | Apple tvOS <15.5 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-26724", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-26724" } }, "description": "Apple tvOS\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nApple tvOS\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eAuthKit \u4e0d\u5f53\u7684\u6743\u9650\u7ba1\u7406\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u7ed5\u8fc7\u8ba4\u8bc1\u8fc7\u7a0b\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.apple.com/en-us/HT213254", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-63642", "openTime": "2022-09-16", "patchDescription": "Apple tvOS\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nApple tvOS\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eAuthKit \u4e0d\u5f53\u7684\u6743\u9650\u7ba1\u7406\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u7ed5\u8fc7\u8ba4\u8bc1\u8fc7\u7a0b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apple tvOS\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Apple tvOS \u003c15.5" }, "referenceLink": "https://support.apple.com/en-us/HT213254", "serverity": "\u4f4e", "submitTime": "2022-05-18", "title": "Apple tvOS\u6388\u6743\u95ee\u9898\u6f0f\u6d1e" }
gsd-2022-26724
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-26724", "description": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication.", "id": "GSD-2022-26724" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-26724" ], "details": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication.", "id": "GSD-2022-26724", "modified": "2023-12-13T01:19:39.224547Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-26724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.5" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A local user may be able to enable iCloud Photos without authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213254", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213254" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.5", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-26724" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An authentication issue was addressed with improved state management. This issue is fixed in tvOS 15.5. A local user may be able to enable iCloud Photos without authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213254", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213254" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-06-03T14:24Z", "publishedDate": "2022-05-26T19:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.