CVE-2022-22675
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
Published
2022-05-26T18:15:09.153
Last Modified
2025-02-14T16:20:32.273
Status
Analyzed
Source
[email protected]
Severity
CVSSv3.1: 7.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
-
Type: Primary
CWE-787
-
Type: Secondary
CWE-787
Affected Vendors & Products
References
-
https://support.apple.com/en-us/HT213219
Release Notes, Vendor Advisory
([email protected])
-
https://support.apple.com/en-us/HT213220
Release Notes, Vendor Advisory
([email protected])
-
https://support.apple.com/en-us/HT213253
Release Notes, Vendor Advisory
([email protected])
-
https://support.apple.com/en-us/HT213254
Release Notes, Vendor Advisory
([email protected])
-
https://support.apple.com/en-us/HT213256
Release Notes, Vendor Advisory
([email protected])
-
https://support.apple.com/en-us/HT213219
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/en-us/HT213220
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/en-us/HT213253
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/en-us/HT213254
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/en-us/HT213256
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)