Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-26757


A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges.


Published

2022-05-26T20:15:09.427

Last Modified

2024-11-21T06:54:26.697

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System apple ipados < 15.5 Yes
Operating System apple iphone_os < 15.5 Yes
Operating System apple mac_os_x < 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple mac_os_x 10.15.7 Yes
Operating System apple macos < 11.6.6 Yes
Operating System apple macos < 12.4 Yes
Operating System apple tvos < 15.5 Yes
Operating System apple watchos < 8.6 Yes

References