{ "id": "CVE-2022-48503", "sourceIdentifier": "product-security@apple.com", "published": "2023-08-14T23:15:10.490", "lastModified": "2024-11-21T07:33:27.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution." }, { "lang": "es", "value": "El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se ha solucionado en tvOS 15.6, watchOS 8.7, iOS 15.6, iPadOS 15.6, macOS Monterey 12.5 and Safari 15.6. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.6", "matchCriteriaId": "5CB295E5-F980-40EC-AF3D-8D5739204C04" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.6", "matchCriteriaId": "F5E4F87A-8003-43EB-99F7-35C82AEA4DC0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.6", "matchCriteriaId": "B6FA9FE3-1891-405C-B191-04CAB84ADD46" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.0.0", "versionEndExcluding": "12.5", "matchCriteriaId": "F86C9DC9-3814-4254-A332-257455B6880A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.6", "matchCriteriaId": "83FC1965-2381-49FF-9521-355D29B28B71" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.7", "matchCriteriaId": "8EB2AF3C-B2A0-41AD-9C3E-14B220620FF0" } ] } ] } ], "references": [ { "url": "https://support.apple.com/en-us/HT213340", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213341", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213342", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213345", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213346", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213340", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213341", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213342", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213345", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213346", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] } ] }