Lucene search

K
cve[email protected]CVE-2022-32844
HistoryFeb 27, 2023 - 8:15 p.m.

CVE-2022-32844

2023-02-2720:15:11
CWE-362
web.nvd.nist.gov
259
8
20
cve-2022-32844
race condition
state handling
tvos
watchos
ios
ipados
security vulnerability

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.9%

A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication.

Affected configurations

Vulners
NVD
Node
appletvosRange<15.6
OR
applewatchosRange<8.7
OR
applewatchosRange<15.6
OR
applewatchosRange<15.6
VendorProductVersionCPE
appletvos*cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
applewatchos*cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
applewatchos*cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
applewatchos*cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Apple",
    "product": "tvOS",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "15.6",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Apple",
    "product": "watchOS",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "8.7",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Apple",
    "product": "watchOS",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "15.6",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Apple",
    "product": "watchOS",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "15.6",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.9%

Related for CVE-2022-32844