Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-42805 (GCVE-0-2022-42805)
Vulnerability from cvelistv5
Published
2022-12-15 00:00
      Modified
2025-04-21 16:18
      
          Severity ?
        
        
      
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - An app may be able to execute arbitrary code with kernel privileges
Summary
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.
            
          
        References
          | URL | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||
Impacted products
        
      {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:19:04.668Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213345"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.apple.com/en-us/HT213346"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-42805",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-21T16:17:26.725541Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-190",
                "description": "CWE-190 Integer Overflow or Wraparound",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-21T16:18:28.195Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "12.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "macOS",
          "vendor": "Apple",
          "versions": [
            {
              "lessThan": "15.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "An app may be able to execute arbitrary code with kernel privileges",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-15T00:00:00.000Z",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "url": "https://support.apple.com/en-us/HT213345"
        },
        {
          "url": "https://support.apple.com/en-us/HT213346"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2022-42805",
    "datePublished": "2022-12-15T00:00:00.000Z",
    "dateReserved": "2022-10-11T00:00:00.000Z",
    "dateUpdated": "2025-04-21T16:18:28.195Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-42805\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2022-12-15T19:15:22.843\",\"lastModified\":\"2025-04-21T17:15:19.353\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 un desbordamiento de enteros con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 15.6, iPadOS 15.6 y macOS Monterey 12.5. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\",\"matchCriteriaId\":\"F5E4F87A-8003-43EB-99F7-35C82AEA4DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\",\"matchCriteriaId\":\"B6FA9FE3-1891-405C-B191-04CAB84ADD46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.5\",\"matchCriteriaId\":\"F86C9DC9-3814-4254-A332-257455B6880A\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/HT213345\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213346\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213346\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213345\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213346\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:19:04.668Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-42805\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-21T16:17:26.725541Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"CWE-190 Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-21T16:18:20.918Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"12.5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.6\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213345\"}, {\"url\": \"https://support.apple.com/en-us/HT213346\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"An app may be able to execute arbitrary code with kernel privileges\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2022-12-15T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-42805\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-21T16:18:28.195Z\", \"dateReserved\": \"2022-10-11T00:00:00.000Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2022-12-15T00:00:00.000Z\", \"assignerShortName\": \"apple\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  ghsa-hv3c-pg7m-3rp8
Vulnerability from github
Published
2022-12-15 21:30
    Modified
2022-12-20 03:30
    
        Severity ?
      
      
    
        VLAI Severity ?
      
      Details
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.
{
  "affected": [],
  "aliases": [
    "CVE-2022-42805"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-190"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2022-12-15T19:15:00Z",
    "severity": "HIGH"
  },
  "details": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.",
  "id": "GHSA-hv3c-pg7m-3rp8",
  "modified": "2022-12-20T03:30:28Z",
  "published": "2022-12-15T21:30:29Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42805"
    },
    {
      "type": "WEB",
      "url": "https://support.apple.com/en-us/HT213345"
    },
    {
      "type": "WEB",
      "url": "https://support.apple.com/en-us/HT213346"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  gsd-2022-42805
Vulnerability from gsd
Modified
2023-12-13 01:19
      Details
        
          An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2022-42805",
    "description": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.",
    "id": "GSD-2022-42805"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-42805"
      ],
      "details": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.",
      "id": "GSD-2022-42805",
      "modified": "2023-12-13T01:19:10.455276Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "product-security@apple.com",
        "ID": "CVE-2022-42805",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "macOS",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c",
                          "version_value": "12.5"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "macOS",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c",
                          "version_value": "15.6"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Apple"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "An app may be able to execute arbitrary code with kernel privileges"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://support.apple.com/en-us/HT213345",
            "refsource": "MISC",
            "url": "https://support.apple.com/en-us/HT213345"
          },
          {
            "name": "https://support.apple.com/en-us/HT213346",
            "refsource": "MISC",
            "url": "https://support.apple.com/en-us/HT213346"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "15.6",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "15.6",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "12.5",
                "versionStartIncluding": "12.0.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2022-42805"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-190"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.apple.com/en-us/HT213345",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://support.apple.com/en-us/HT213345"
            },
            {
              "name": "https://support.apple.com/en-us/HT213346",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Vendor Advisory"
              ],
              "url": "https://support.apple.com/en-us/HT213346"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 5.9
        }
      },
      "lastModifiedDate": "2022-12-20T02:27Z",
      "publishedDate": "2022-12-15T19:15Z"
    }
  }
}
  fkie_cve-2022-42805
Vulnerability from fkie_nvd
Published
2022-12-15 19:15
    Modified
2025-04-21 17:15
    
          Severity ?
        
        
        
        
          
            
            
            
          
          
          
            
            7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
          
        
      
    7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.
    References
      | URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/HT213345 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213346 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213345 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213346 | Release Notes, Vendor Advisory | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5E4F87A-8003-43EB-99F7-35C82AEA4DC0",
              "versionEndExcluding": "15.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6FA9FE3-1891-405C-B191-04CAB84ADD46",
              "versionEndExcluding": "15.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F86C9DC9-3814-4254-A332-257455B6880A",
              "versionEndExcluding": "12.5",
              "versionStartIncluding": "12.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges."
    },
    {
      "lang": "es",
      "value": "Se solucion\u00f3 un desbordamiento de enteros con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 15.6, iPadOS 15.6 y macOS Monterey 12.5. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
    }
  ],
  "id": "CVE-2022-42805",
  "lastModified": "2025-04-21T17:15:19.353",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-12-15T19:15:22.843",
  "references": [
    {
      "source": "product-security@apple.com",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://support.apple.com/en-us/HT213345"
    },
    {
      "source": "product-security@apple.com",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://support.apple.com/en-us/HT213346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://support.apple.com/en-us/HT213345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://support.apple.com/en-us/HT213346"
    }
  ],
  "sourceIdentifier": "product-security@apple.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}
  wid-sec-w-2022-0778
Vulnerability from csaf_certbund
Published
2022-07-20 22:00
    Modified
2025-10-20 22:00
    Summary
Apple macOS: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
    Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen.
    Betroffene Betriebssysteme
- MacOS X
    {
  "document": {
    "aggregate_severity": {
      "text": "kritisch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- MacOS X",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0778 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0778.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0778 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0778"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisroy vom 2022-07-20",
        "url": "https://support.apple.com/en-us/HT213343"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisroy vom 2022-07-20",
        "url": "https://support.apple.com/en-us/HT213344"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisroy vom 2022-07-20",
        "url": "https://support.apple.com/en-us/HT213345"
      },
      {
        "category": "external",
        "summary": "Known Exploited Vulnerabilities Catalog vom 2025-10-20",
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
      }
    ],
    "source_lang": "en-US",
    "title": "Apple macOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-20T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-21T08:28:29.099+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0778",
      "initial_release_date": "2022-07-20T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-07-20T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-07-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Referenz erg\u00e4nzt"
        },
        {
          "date": "2022-09-20T22:00:00.000+00:00",
          "number": "3",
          "summary": "CVE Nummern CVE-2022-32861, CVE-2022-32863, CVE-2022-32880 erg\u00e4nzt"
        },
        {
          "date": "2022-10-06T22:00:00.000+00:00",
          "number": "4",
          "summary": "CVE erg\u00e4nzt"
        },
        {
          "date": "2023-06-21T22:00:00.000+00:00",
          "number": "5",
          "summary": "CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503, CVE-2022-32860 erg\u00e4nzt"
        },
        {
          "date": "2025-10-20T22:00:00.000+00:00",
          "number": "6",
          "summary": "Aktive Ausnutzung gemeldet"
        }
      ],
      "status": "final",
      "version": "6"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Catalina \u003c2022-005",
                "product": {
                  "name": "Apple macOS Catalina \u003c2022-005",
                  "product_id": "T023996"
                }
              },
              {
                "category": "product_version",
                "name": "Catalina 2022-005",
                "product": {
                  "name": "Apple macOS Catalina 2022-005",
                  "product_id": "T023996-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:mac_os:catalina__2022-005"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Big Sur \u003c11.6.8",
                "product": {
                  "name": "Apple macOS Big Sur \u003c11.6.8",
                  "product_id": "T023997"
                }
              },
              {
                "category": "product_version",
                "name": "Big Sur 11.6.8",
                "product": {
                  "name": "Apple macOS Big Sur 11.6.8",
                  "product_id": "T023997-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:mac_os:big_sur__11.6.8"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Monterey \u003c12.5",
                "product": {
                  "name": "Apple macOS Monterey \u003c12.5",
                  "product_id": "T023998"
                }
              },
              {
                "category": "product_version",
                "name": "Monterey 12.5",
                "product": {
                  "name": "Apple macOS Monterey 12.5",
                  "product_id": "T023998-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:mac_os:monterey__12.5"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "macOS"
          }
        ],
        "category": "vendor",
        "name": "Apple"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-28544",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-28544"
    },
    {
      "cve": "CVE-2021-4136",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4136"
    },
    {
      "cve": "CVE-2021-4166",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4166"
    },
    {
      "cve": "CVE-2021-4173",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4173"
    },
    {
      "cve": "CVE-2021-4187",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4187"
    },
    {
      "cve": "CVE-2021-4192",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4192"
    },
    {
      "cve": "CVE-2021-4193",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4193"
    },
    {
      "cve": "CVE-2021-46059",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-46059"
    },
    {
      "cve": "CVE-2022-0128",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-0128"
    },
    {
      "cve": "CVE-2022-0156",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-0156"
    },
    {
      "cve": "CVE-2022-0158",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-0158"
    },
    {
      "cve": "CVE-2022-2294",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-2294"
    },
    {
      "cve": "CVE-2022-24070",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-24070"
    },
    {
      "cve": "CVE-2022-26704",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26704"
    },
    {
      "cve": "CVE-2022-26981",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26981"
    },
    {
      "cve": "CVE-2022-29046",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-29046"
    },
    {
      "cve": "CVE-2022-29048",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-29048"
    },
    {
      "cve": "CVE-2022-32781",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32781"
    },
    {
      "cve": "CVE-2022-32785",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32785"
    },
    {
      "cve": "CVE-2022-32786",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32786"
    },
    {
      "cve": "CVE-2022-32787",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32787"
    },
    {
      "cve": "CVE-2022-32789",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32789"
    },
    {
      "cve": "CVE-2022-32792",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32792"
    },
    {
      "cve": "CVE-2022-32793",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32793"
    },
    {
      "cve": "CVE-2022-32796",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32796"
    },
    {
      "cve": "CVE-2022-32797",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32797"
    },
    {
      "cve": "CVE-2022-32798",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32798"
    },
    {
      "cve": "CVE-2022-32799",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32799"
    },
    {
      "cve": "CVE-2022-32800",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32800"
    },
    {
      "cve": "CVE-2022-32801",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32801"
    },
    {
      "cve": "CVE-2022-32805",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32805"
    },
    {
      "cve": "CVE-2022-32807",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32807"
    },
    {
      "cve": "CVE-2022-32810",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32810"
    },
    {
      "cve": "CVE-2022-32811",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32811"
    },
    {
      "cve": "CVE-2022-32812",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32812"
    },
    {
      "cve": "CVE-2022-32813",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32813"
    },
    {
      "cve": "CVE-2022-32814",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32814"
    },
    {
      "cve": "CVE-2022-32815",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32815"
    },
    {
      "cve": "CVE-2022-32816",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32816"
    },
    {
      "cve": "CVE-2022-32817",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32817"
    },
    {
      "cve": "CVE-2022-32818",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32818"
    },
    {
      "cve": "CVE-2022-32819",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32819"
    },
    {
      "cve": "CVE-2022-32820",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32820"
    },
    {
      "cve": "CVE-2022-32821",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32821"
    },
    {
      "cve": "CVE-2022-32823",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32823"
    },
    {
      "cve": "CVE-2022-32825",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32825"
    },
    {
      "cve": "CVE-2022-32826",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32826"
    },
    {
      "cve": "CVE-2022-32828",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32828"
    },
    {
      "cve": "CVE-2022-32829",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32829"
    },
    {
      "cve": "CVE-2022-32831",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32831"
    },
    {
      "cve": "CVE-2022-32832",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32832"
    },
    {
      "cve": "CVE-2022-32834",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32834"
    },
    {
      "cve": "CVE-2022-32837",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32837"
    },
    {
      "cve": "CVE-2022-32838",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32838"
    },
    {
      "cve": "CVE-2022-32839",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32839"
    },
    {
      "cve": "CVE-2022-32840",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32840"
    },
    {
      "cve": "CVE-2022-32841",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32841"
    },
    {
      "cve": "CVE-2022-32842",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32842"
    },
    {
      "cve": "CVE-2022-32843",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32843"
    },
    {
      "cve": "CVE-2022-32845",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32845"
    },
    {
      "cve": "CVE-2022-32847",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32847"
    },
    {
      "cve": "CVE-2022-32848",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32848"
    },
    {
      "cve": "CVE-2022-32849",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32849"
    },
    {
      "cve": "CVE-2022-32851",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32851"
    },
    {
      "cve": "CVE-2022-32852",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32852"
    },
    {
      "cve": "CVE-2022-32853",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32853"
    },
    {
      "cve": "CVE-2022-32857",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32857"
    },
    {
      "cve": "CVE-2022-32860",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32860"
    },
    {
      "cve": "CVE-2022-32861",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32861"
    },
    {
      "cve": "CVE-2022-32863",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32863"
    },
    {
      "cve": "CVE-2022-32880",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32880"
    },
    {
      "cve": "CVE-2022-32885",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32885"
    },
    {
      "cve": "CVE-2022-32910",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32910"
    },
    {
      "cve": "CVE-2022-32948",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32948"
    },
    {
      "cve": "CVE-2022-42805",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-42805"
    },
    {
      "cve": "CVE-2022-48503",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-48503"
    }
  ]
}
  wid-sec-w-2022-0782
Vulnerability from csaf_certbund
Published
2022-07-20 22:00
    Modified
2025-10-20 22:00
    Summary
Apple iOS: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
    Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
    Betroffene Betriebssysteme
- iPhoneOS
    {
  "document": {
    "aggregate_severity": {
      "text": "kritisch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, seine Privilegien zu erweitern und Informationen falsch darzustellen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- iPhoneOS",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0782 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0782.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0782 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0782"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisory vom 2022-07-20",
        "url": "https://support.apple.com/HT213346"
      },
      {
        "category": "external",
        "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-10-20",
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
      }
    ],
    "source_lang": "en-US",
    "title": "Apple iOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-20T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-21T08:23:25.439+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0782",
      "initial_release_date": "2022-07-20T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-07-20T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-07-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Referenz aufgenommen"
        },
        {
          "date": "2023-06-21T22:00:00.000+00:00",
          "number": "3",
          "summary": "CVE-2022-32860, CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503 erg\u00e4nzt"
        },
        {
          "date": "2025-10-20T22:00:00.000+00:00",
          "number": "4",
          "summary": "Aktive Ausnutzung gemeldet"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c15.6",
                "product": {
                  "name": "Apple iOS \u003c15.6",
                  "product_id": "T024029"
                }
              },
              {
                "category": "product_version",
                "name": "15.6",
                "product": {
                  "name": "Apple iOS 15.6",
                  "product_id": "T024029-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:iphone_os:15.6"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "iOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c15.6",
                "product": {
                  "name": "Apple iPadOS \u003c15.6",
                  "product_id": "T024030"
                }
              },
              {
                "category": "product_version",
                "name": "15.6",
                "product": {
                  "name": "Apple iPadOS 15.6",
                  "product_id": "T024030-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:ipados:15.6"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "iPadOS"
          }
        ],
        "category": "vendor",
        "name": "Apple"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-2294",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-2294"
    },
    {
      "cve": "CVE-2022-26768",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26768"
    },
    {
      "cve": "CVE-2022-26981",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26981"
    },
    {
      "cve": "CVE-2022-32784",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32784"
    },
    {
      "cve": "CVE-2022-32785",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32785"
    },
    {
      "cve": "CVE-2022-32787",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32787"
    },
    {
      "cve": "CVE-2022-32788",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32788"
    },
    {
      "cve": "CVE-2022-32792",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32792"
    },
    {
      "cve": "CVE-2022-32793",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32793"
    },
    {
      "cve": "CVE-2022-32802",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32802"
    },
    {
      "cve": "CVE-2022-32810",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32810"
    },
    {
      "cve": "CVE-2022-32813",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32813"
    },
    {
      "cve": "CVE-2022-32814",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32814"
    },
    {
      "cve": "CVE-2022-32815",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32815"
    },
    {
      "cve": "CVE-2022-32816",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32816"
    },
    {
      "cve": "CVE-2022-32817",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32817"
    },
    {
      "cve": "CVE-2022-32819",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32819"
    },
    {
      "cve": "CVE-2022-32820",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32820"
    },
    {
      "cve": "CVE-2022-32821",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32821"
    },
    {
      "cve": "CVE-2022-32823",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32823"
    },
    {
      "cve": "CVE-2022-32824",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32824"
    },
    {
      "cve": "CVE-2022-32825",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32825"
    },
    {
      "cve": "CVE-2022-32826",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32826"
    },
    {
      "cve": "CVE-2022-32828",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32828"
    },
    {
      "cve": "CVE-2022-32829",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32829"
    },
    {
      "cve": "CVE-2022-32830",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32830"
    },
    {
      "cve": "CVE-2022-32832",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32832"
    },
    {
      "cve": "CVE-2022-32837",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32837"
    },
    {
      "cve": "CVE-2022-32838",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32838"
    },
    {
      "cve": "CVE-2022-32839",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32839"
    },
    {
      "cve": "CVE-2022-32840",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32840"
    },
    {
      "cve": "CVE-2022-32841",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32841"
    },
    {
      "cve": "CVE-2022-32844",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32844"
    },
    {
      "cve": "CVE-2022-32845",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32845"
    },
    {
      "cve": "CVE-2022-32847",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32847"
    },
    {
      "cve": "CVE-2022-32849",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32849"
    },
    {
      "cve": "CVE-2022-32855",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32855"
    },
    {
      "cve": "CVE-2022-32857",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32857"
    },
    {
      "cve": "CVE-2022-32860",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32860"
    },
    {
      "cve": "CVE-2022-32885",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32885"
    },
    {
      "cve": "CVE-2022-32948",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32948"
    },
    {
      "cve": "CVE-2022-42805",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-42805"
    },
    {
      "cve": "CVE-2022-48503",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-48503"
    }
  ]
}
  WID-SEC-W-2022-0778
Vulnerability from csaf_certbund
Published
2022-07-20 22:00
    Modified
2025-10-20 22:00
    Summary
Apple macOS: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
    Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen.
    Betroffene Betriebssysteme
- MacOS X
    {
  "document": {
    "aggregate_severity": {
      "text": "kritisch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- MacOS X",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0778 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0778.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0778 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0778"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisroy vom 2022-07-20",
        "url": "https://support.apple.com/en-us/HT213343"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisroy vom 2022-07-20",
        "url": "https://support.apple.com/en-us/HT213344"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisroy vom 2022-07-20",
        "url": "https://support.apple.com/en-us/HT213345"
      },
      {
        "category": "external",
        "summary": "Known Exploited Vulnerabilities Catalog vom 2025-10-20",
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
      }
    ],
    "source_lang": "en-US",
    "title": "Apple macOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-20T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-21T08:28:29.099+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0778",
      "initial_release_date": "2022-07-20T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-07-20T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-07-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Referenz erg\u00e4nzt"
        },
        {
          "date": "2022-09-20T22:00:00.000+00:00",
          "number": "3",
          "summary": "CVE Nummern CVE-2022-32861, CVE-2022-32863, CVE-2022-32880 erg\u00e4nzt"
        },
        {
          "date": "2022-10-06T22:00:00.000+00:00",
          "number": "4",
          "summary": "CVE erg\u00e4nzt"
        },
        {
          "date": "2023-06-21T22:00:00.000+00:00",
          "number": "5",
          "summary": "CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503, CVE-2022-32860 erg\u00e4nzt"
        },
        {
          "date": "2025-10-20T22:00:00.000+00:00",
          "number": "6",
          "summary": "Aktive Ausnutzung gemeldet"
        }
      ],
      "status": "final",
      "version": "6"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Catalina \u003c2022-005",
                "product": {
                  "name": "Apple macOS Catalina \u003c2022-005",
                  "product_id": "T023996"
                }
              },
              {
                "category": "product_version",
                "name": "Catalina 2022-005",
                "product": {
                  "name": "Apple macOS Catalina 2022-005",
                  "product_id": "T023996-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:mac_os:catalina__2022-005"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Big Sur \u003c11.6.8",
                "product": {
                  "name": "Apple macOS Big Sur \u003c11.6.8",
                  "product_id": "T023997"
                }
              },
              {
                "category": "product_version",
                "name": "Big Sur 11.6.8",
                "product": {
                  "name": "Apple macOS Big Sur 11.6.8",
                  "product_id": "T023997-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:mac_os:big_sur__11.6.8"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Monterey \u003c12.5",
                "product": {
                  "name": "Apple macOS Monterey \u003c12.5",
                  "product_id": "T023998"
                }
              },
              {
                "category": "product_version",
                "name": "Monterey 12.5",
                "product": {
                  "name": "Apple macOS Monterey 12.5",
                  "product_id": "T023998-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:mac_os:monterey__12.5"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "macOS"
          }
        ],
        "category": "vendor",
        "name": "Apple"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-28544",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-28544"
    },
    {
      "cve": "CVE-2021-4136",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4136"
    },
    {
      "cve": "CVE-2021-4166",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4166"
    },
    {
      "cve": "CVE-2021-4173",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4173"
    },
    {
      "cve": "CVE-2021-4187",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4187"
    },
    {
      "cve": "CVE-2021-4192",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4192"
    },
    {
      "cve": "CVE-2021-4193",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-4193"
    },
    {
      "cve": "CVE-2021-46059",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2021-46059"
    },
    {
      "cve": "CVE-2022-0128",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-0128"
    },
    {
      "cve": "CVE-2022-0156",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-0156"
    },
    {
      "cve": "CVE-2022-0158",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-0158"
    },
    {
      "cve": "CVE-2022-2294",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-2294"
    },
    {
      "cve": "CVE-2022-24070",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-24070"
    },
    {
      "cve": "CVE-2022-26704",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26704"
    },
    {
      "cve": "CVE-2022-26981",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26981"
    },
    {
      "cve": "CVE-2022-29046",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-29046"
    },
    {
      "cve": "CVE-2022-29048",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-29048"
    },
    {
      "cve": "CVE-2022-32781",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32781"
    },
    {
      "cve": "CVE-2022-32785",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32785"
    },
    {
      "cve": "CVE-2022-32786",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32786"
    },
    {
      "cve": "CVE-2022-32787",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32787"
    },
    {
      "cve": "CVE-2022-32789",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32789"
    },
    {
      "cve": "CVE-2022-32792",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32792"
    },
    {
      "cve": "CVE-2022-32793",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32793"
    },
    {
      "cve": "CVE-2022-32796",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32796"
    },
    {
      "cve": "CVE-2022-32797",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32797"
    },
    {
      "cve": "CVE-2022-32798",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32798"
    },
    {
      "cve": "CVE-2022-32799",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32799"
    },
    {
      "cve": "CVE-2022-32800",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32800"
    },
    {
      "cve": "CVE-2022-32801",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32801"
    },
    {
      "cve": "CVE-2022-32805",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32805"
    },
    {
      "cve": "CVE-2022-32807",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32807"
    },
    {
      "cve": "CVE-2022-32810",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32810"
    },
    {
      "cve": "CVE-2022-32811",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32811"
    },
    {
      "cve": "CVE-2022-32812",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32812"
    },
    {
      "cve": "CVE-2022-32813",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32813"
    },
    {
      "cve": "CVE-2022-32814",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32814"
    },
    {
      "cve": "CVE-2022-32815",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32815"
    },
    {
      "cve": "CVE-2022-32816",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32816"
    },
    {
      "cve": "CVE-2022-32817",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32817"
    },
    {
      "cve": "CVE-2022-32818",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32818"
    },
    {
      "cve": "CVE-2022-32819",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32819"
    },
    {
      "cve": "CVE-2022-32820",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32820"
    },
    {
      "cve": "CVE-2022-32821",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32821"
    },
    {
      "cve": "CVE-2022-32823",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32823"
    },
    {
      "cve": "CVE-2022-32825",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32825"
    },
    {
      "cve": "CVE-2022-32826",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32826"
    },
    {
      "cve": "CVE-2022-32828",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32828"
    },
    {
      "cve": "CVE-2022-32829",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32829"
    },
    {
      "cve": "CVE-2022-32831",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32831"
    },
    {
      "cve": "CVE-2022-32832",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32832"
    },
    {
      "cve": "CVE-2022-32834",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32834"
    },
    {
      "cve": "CVE-2022-32837",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32837"
    },
    {
      "cve": "CVE-2022-32838",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32838"
    },
    {
      "cve": "CVE-2022-32839",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32839"
    },
    {
      "cve": "CVE-2022-32840",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32840"
    },
    {
      "cve": "CVE-2022-32841",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32841"
    },
    {
      "cve": "CVE-2022-32842",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32842"
    },
    {
      "cve": "CVE-2022-32843",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32843"
    },
    {
      "cve": "CVE-2022-32845",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32845"
    },
    {
      "cve": "CVE-2022-32847",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32847"
    },
    {
      "cve": "CVE-2022-32848",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32848"
    },
    {
      "cve": "CVE-2022-32849",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32849"
    },
    {
      "cve": "CVE-2022-32851",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32851"
    },
    {
      "cve": "CVE-2022-32852",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32852"
    },
    {
      "cve": "CVE-2022-32853",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32853"
    },
    {
      "cve": "CVE-2022-32857",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32857"
    },
    {
      "cve": "CVE-2022-32860",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32860"
    },
    {
      "cve": "CVE-2022-32861",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32861"
    },
    {
      "cve": "CVE-2022-32863",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32863"
    },
    {
      "cve": "CVE-2022-32880",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32880"
    },
    {
      "cve": "CVE-2022-32885",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32885"
    },
    {
      "cve": "CVE-2022-32910",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32910"
    },
    {
      "cve": "CVE-2022-32948",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32948"
    },
    {
      "cve": "CVE-2022-42805",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-42805"
    },
    {
      "cve": "CVE-2022-48503",
      "product_status": {
        "known_affected": [
          "T023996",
          "T023997",
          "T023998"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-48503"
    }
  ]
}
  WID-SEC-W-2022-0782
Vulnerability from csaf_certbund
Published
2022-07-20 22:00
    Modified
2025-10-20 22:00
    Summary
Apple iOS: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
    Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
    Betroffene Betriebssysteme
- iPhoneOS
    {
  "document": {
    "aggregate_severity": {
      "text": "kritisch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, seine Privilegien zu erweitern und Informationen falsch darzustellen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- iPhoneOS",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-0782 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0782.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-0782 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0782"
      },
      {
        "category": "external",
        "summary": "Apple Security Advisory vom 2022-07-20",
        "url": "https://support.apple.com/HT213346"
      },
      {
        "category": "external",
        "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-10-20",
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
      }
    ],
    "source_lang": "en-US",
    "title": "Apple iOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-10-20T22:00:00.000+00:00",
      "generator": {
        "date": "2025-10-21T08:23:25.439+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-0782",
      "initial_release_date": "2022-07-20T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-07-20T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2022-07-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Referenz aufgenommen"
        },
        {
          "date": "2023-06-21T22:00:00.000+00:00",
          "number": "3",
          "summary": "CVE-2022-32860, CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503 erg\u00e4nzt"
        },
        {
          "date": "2025-10-20T22:00:00.000+00:00",
          "number": "4",
          "summary": "Aktive Ausnutzung gemeldet"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c15.6",
                "product": {
                  "name": "Apple iOS \u003c15.6",
                  "product_id": "T024029"
                }
              },
              {
                "category": "product_version",
                "name": "15.6",
                "product": {
                  "name": "Apple iOS 15.6",
                  "product_id": "T024029-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:iphone_os:15.6"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "iOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c15.6",
                "product": {
                  "name": "Apple iPadOS \u003c15.6",
                  "product_id": "T024030"
                }
              },
              {
                "category": "product_version",
                "name": "15.6",
                "product": {
                  "name": "Apple iPadOS 15.6",
                  "product_id": "T024030-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:apple:ipados:15.6"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "iPadOS"
          }
        ],
        "category": "vendor",
        "name": "Apple"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-2294",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-2294"
    },
    {
      "cve": "CVE-2022-26768",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26768"
    },
    {
      "cve": "CVE-2022-26981",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-26981"
    },
    {
      "cve": "CVE-2022-32784",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32784"
    },
    {
      "cve": "CVE-2022-32785",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32785"
    },
    {
      "cve": "CVE-2022-32787",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32787"
    },
    {
      "cve": "CVE-2022-32788",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32788"
    },
    {
      "cve": "CVE-2022-32792",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32792"
    },
    {
      "cve": "CVE-2022-32793",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32793"
    },
    {
      "cve": "CVE-2022-32802",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32802"
    },
    {
      "cve": "CVE-2022-32810",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32810"
    },
    {
      "cve": "CVE-2022-32813",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32813"
    },
    {
      "cve": "CVE-2022-32814",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32814"
    },
    {
      "cve": "CVE-2022-32815",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32815"
    },
    {
      "cve": "CVE-2022-32816",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32816"
    },
    {
      "cve": "CVE-2022-32817",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32817"
    },
    {
      "cve": "CVE-2022-32819",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32819"
    },
    {
      "cve": "CVE-2022-32820",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32820"
    },
    {
      "cve": "CVE-2022-32821",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32821"
    },
    {
      "cve": "CVE-2022-32823",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32823"
    },
    {
      "cve": "CVE-2022-32824",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32824"
    },
    {
      "cve": "CVE-2022-32825",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32825"
    },
    {
      "cve": "CVE-2022-32826",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32826"
    },
    {
      "cve": "CVE-2022-32828",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32828"
    },
    {
      "cve": "CVE-2022-32829",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32829"
    },
    {
      "cve": "CVE-2022-32830",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32830"
    },
    {
      "cve": "CVE-2022-32832",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32832"
    },
    {
      "cve": "CVE-2022-32837",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32837"
    },
    {
      "cve": "CVE-2022-32838",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32838"
    },
    {
      "cve": "CVE-2022-32839",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32839"
    },
    {
      "cve": "CVE-2022-32840",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32840"
    },
    {
      "cve": "CVE-2022-32841",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32841"
    },
    {
      "cve": "CVE-2022-32844",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32844"
    },
    {
      "cve": "CVE-2022-32845",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32845"
    },
    {
      "cve": "CVE-2022-32847",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32847"
    },
    {
      "cve": "CVE-2022-32849",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32849"
    },
    {
      "cve": "CVE-2022-32855",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32855"
    },
    {
      "cve": "CVE-2022-32857",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32857"
    },
    {
      "cve": "CVE-2022-32860",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32860"
    },
    {
      "cve": "CVE-2022-32885",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32885"
    },
    {
      "cve": "CVE-2022-32948",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-32948"
    },
    {
      "cve": "CVE-2022-42805",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-42805"
    },
    {
      "cve": "CVE-2022-48503",
      "product_status": {
        "known_affected": [
          "T024030",
          "T024029"
        ]
      },
      "release_date": "2022-07-20T22:00:00.000+00:00",
      "title": "CVE-2022-48503"
    }
  ]
}
  var-202211-1704
Vulnerability from variot
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. apple's iPadOS , iOS , macOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1704",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "macos",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "12.0.0"
      },
      {
        "model": "ipados",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "15.6"
      },
      {
        "model": "iphone os",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "15.6"
      },
      {
        "model": "macos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "12.5"
      },
      {
        "model": "macos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": "12.0.0  that\u0027s all  12.5"
      },
      {
        "model": "ipados",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": null
      },
      {
        "model": "ios",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "cve": "CVE-2022-42805",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2022-42805",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2022-42805",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-42805",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2022-42805",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202212-3344",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. apple\u0027s iPadOS , iOS , macOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "VULHUB",
        "id": "VHN-439590"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-42805",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-439590",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-42805",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-439590"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-42805"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "id": "VAR-202211-1704",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-439590"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:17:34.054000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HT213345 Apple\u00a0 Security update",
        "trust": 0.8,
        "url": "https://support.apple.com/en-us/HT213345"
      },
      {
        "title": "Apple iOS Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=218518"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/0x36/weightBufs "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2022-42805"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-190",
        "trust": 1.1
      },
      {
        "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-439590"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://support.apple.com/en-us/ht213345"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/en-us/ht213346"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-42805"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-42805/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/0x36/weightbufs"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-439590"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-42805"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-439590"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-42805"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-439590"
      },
      {
        "date": "2023-11-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "date": "2022-12-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      },
      {
        "date": "2022-12-15T19:15:22.843000",
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-439590"
      },
      {
        "date": "2023-11-29T05:53:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      },
      {
        "date": "2022-12-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      },
      {
        "date": "2022-12-20T02:27:31.080000",
        "db": "NVD",
        "id": "CVE-2022-42805"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Integer overflow vulnerability in multiple Apple products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023661"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-3344"
      }
    ],
    "trust": 0.6
  }
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…