{ "id": "CVE-2022-22675", "sourceIdentifier": "product-security@apple.com", "published": "2022-05-26T18:15:09.153", "lastModified": "2024-11-21T06:47:15.030", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.." }, { "lang": "es", "value": "Se abord\u00f3 un problema de escritura fuera de l\u00edmites con una comprobaci\u00f3n de l\u00edmites mejorada. Este problema es corregido en tvOS versi\u00f3n 15.5, watchOS versi\u00f3n 8.6, macOS Big Sur versi\u00f3n 11.6.6, macOS Monterey versi\u00f3n 12.3.1, iOS versi\u00f3n 15.4.1 y iPadOS versi\u00f3n 15.4.1. Una aplicaci\u00f3n puede ser capaz de ejecutar c\u00f3digo arbitrario con privilegios del kernel. Apple est\u00e1 al tanto de un informe de que este problema puede haber sido explotado activamente" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "cisaExploitAdd": "2022-04-04", "cisaActionDue": "2022-04-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apple macOS Out-of-Bounds Write Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-787" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.4.1", "matchCriteriaId": "1D175C4B-8E87-4813-B890-4423D6953827" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.4.1", "matchCriteriaId": "9B815382-7722-4962-9E88-F398FB193E8E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.0", "versionEndExcluding": "11.6.6", "matchCriteriaId": "09A6345C-D813-43BA-B12E-789C80653F86" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionStartIncluding": "12.0.0", "versionEndExcluding": "12.3.1", "matchCriteriaId": "8C1197BE-35FD-471F-9863-72D6BDF5DE5A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.5", "matchCriteriaId": "4C98BE9E-8463-4CB9-8E42-A68DC0B20BD8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.6", "matchCriteriaId": "E8BAAD78-60FC-4EC3-B727-55F0C0969D6A" } ] } ] } ], "references": [ { "url": "https://support.apple.com/en-us/HT213219", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213220", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213253", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213254", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213256", "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213219", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213220", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213253", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213254", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213256", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ] } ] }