Vulnerability Name: | CVE-2022-22675 (CCN-223147) | ||||||||||||
Assigned: | 2022-03-31 | ||||||||||||
Published: | 2022-03-31 | ||||||||||||
Updated: | 2022-06-08 | ||||||||||||
Summary: | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-22675 Source: XF Type: UNKNOWN apple-macos-cve202222675-priv-esc(223147) Source: CCN Type: Apple security document HT213219 About the security content of iOS 15.4.1 and iPadOS 15.4.1 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT213219 Source: CCN Type: Apple security document HT213220 About the security content of macOS Monterey 12.3.1 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT213220 Source: CCN Type: Apple security document HT213253 About the security content of watchOS 8.6 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT213253 Source: CCN Type: Apple security document HT213254 About the security content of tvOS 15.5 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT213254 Source: CCN Type: Apple security document HT213256 About the security content of macOS Big Sur 11.6.6 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/en-us/HT213256 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |