{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-26765", "ASSIGNER": "product-security@apple.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Apple", "product": { "product_data": [ { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "8.6" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "15.5" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "12.4" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "15.5" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213258", "name": "https://support.apple.com/en-us/HT213258" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213253", "name": "https://support.apple.com/en-us/HT213253" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213254", "name": "https://support.apple.com/en-us/HT213254" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213257", "name": "https://support.apple.com/en-us/HT213257" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A race condition was addressed with improved state handling. This issue is fixed in watchOS 8.6, tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication." } ] } }