Vulnerability Name: CVE-2022-32839 (CCN-231679) Assigned: 2022-07-20 Published: 2022-07-20 Updated: 2022-11-02 Summary: The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6, tvOS 15.6, watchOS 8.7. A remote user may cause an unexpected app termination or arbitrary code execution. CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2022-32839 Source: XF Type: UNKNOWNapple-macos-cve202232839-code-exec(231679) Source: MISC Type: Release Notes, Vendor Advisoryhttps://support.apple.com/en-us/HT213340 Source: CCN Type: Apple security document HT213342About the security content of tvOS 15.6 Source: MISC Type: Release Notes, Vendor Advisoryhttps://support.apple.com/en-us/HT213342 Source: CCN Type: Apple security document HT213343About the security content of Security Update 2022-005 Catalina Source: MISC Type: Release Notes, Vendor Advisoryhttps://support.apple.com/en-us/HT213343 Source: MISC Type: Release Notes, Vendor Advisoryhttps://support.apple.com/en-us/HT213344 Source: CCN Type: Apple security document HT213345About the security content of macOS Monterey 12.5 Source: MISC Type: Release Notes, Vendor Advisoryhttps://support.apple.com/en-us/HT213345 Source: MISC Type: Release Notes, Vendor Advisoryhttps://support.apple.com/en-us/HT213346 Vulnerable Configuration: Configuration 1 :cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version < 10.15.7)OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:* OR cpe:/o:apple:ipados:*:*:*:*:*:*:*:* (Version < 15.6) OR cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version < 15.6) OR cpe:/o:apple:macos:10.15.7:-:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:* OR cpe:/o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:* OR cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version >= 11.0 and < 11.6.8) OR cpe:/o:apple:macos:*:*:*:*:*:*:*:* (Version >= 12.0 and < 12.5) OR cpe:/o:apple:tvos:*:*:*:*:*:*:*:* (Version < 15.6) OR cpe:/o:apple:watchos:*:*:*:*:*:*:*:* (Version < 8.7) Configuration CCN 1 :cpe:/o:apple:macos_catalina:10.15.1:*:*:*:*:*:*:* OR cpe:/o:apple:macos_monterey:12.4:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
apple macos *
apple mac os x 10.15.7 security_update_2020-001
apple mac os x 10.15.7 security_update_2021-001
apple mac os x 10.15.7 security_update_2021-002
apple mac os x 10.15.7 security_update_2021-003
apple mac os x 10.15.7 security_update_2021-004
apple mac os x 10.15.7 security_update_2021-005
apple mac os x 10.15.7 security_update_2021-006
apple mac os x 10.15.7 security_update_2021-008
apple ipados *
apple iphone os *
apple macos 10.15.7 -
apple mac os x 10.15.7 security_update_2021-007
apple mac os x 10.15.7 security_update_2022-001
apple mac os x 10.15.7 security_update_2022-002
apple mac os x 10.15.7 security_update_2022-003
apple macos 10.15.7 security_update_2022-004
apple macos *
apple macos *
apple tvos *
apple watchos *
apple macos catalina 10.15.1
apple macos monterey 12.4