René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

116 lines
3.6 KiB
JSON

{
"id": "CVE-2022-42827",
"sourceIdentifier": "product-security@apple.com",
"published": "2022-11-01T20:15:24.333",
"lastModified": "2022-11-03T13:33:54.017",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-10-25",
"cisaActionDue": "2022-11-15",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS and iPadOS Out-of-Bounds Write Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.7.1",
"matchCriteriaId": "46D91788-9173-4FA2-A956-18286461B859"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.7.1",
"matchCriteriaId": "0C42DEF1-164C-42F0-932E-A6B2F4CD8557"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "721D0DB1-70EE-458E-B3DA-CA53BD37CE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.6.1",
"matchCriteriaId": "683AE472-CFF7-4D5A-936A-42FA43C27E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.1",
"matchCriteriaId": "F3B857D6-19FE-4535-9BA2-6BD54B9BB6F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1",
"matchCriteriaId": "32BABE0E-193A-4A4D-96E9-84BB48649C9A"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213489",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213490",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}