2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-32891" ,
"sourceIdentifier" : "product-security@apple.com" ,
"published" : "2023-02-27T20:15:12.063" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:07:10.457" ,
2023-05-30 08:00:29 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing."
2024-09-15 02:03:16 +00:00
} ,
{
"lang" : "es" ,
"value" : "El problema se solucion\u00f3 mejorando el manejo de la interfaz de usuario. Este problema se solucion\u00f3 en Safari 16, tvOS 16, watchOS 9, iOS 16. Visitar un sitio web que enmarque contenido malicioso puede provocar una suplantaci\u00f3n de la interfaz de usuario."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.7
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-1021"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0" ,
"matchCriteriaId" : "B5F783A1-114C-4DFC-9F2E-0D43D62CBC69"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0" ,
"matchCriteriaId" : "D1D9387F-63B6-41B3-8BDC-A6102EE5F1E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "16.0" ,
"matchCriteriaId" : "534DED19-82FC-4E39-BFD3-F2FE5C71A66B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.0" ,
"matchCriteriaId" : "712A2CD4-6807-496A-8467-BFB138371E51"
}
]
}
]
}
] ,
"references" : [
2023-05-30 08:00:29 +00:00
{
"url" : "https://security.gentoo.org/glsa/202305-32" ,
"source" : "product-security@apple.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "https://support.apple.com/en-us/HT213442" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT213446" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT213486" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT213487" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://security.gentoo.org/glsa/202305-32" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://support.apple.com/en-us/HT213442" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT213446" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT213486" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT213487" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}