Risk | High |
Patch available | YES |
Number of vulnerabilities | 31 |
CVE-ID | CVE-2022-26757 CVE-2022-26745 CVE-2022-26719 CVE-2022-26716 CVE-2022-26717 CVE-2022-26710 CVE-2022-26709 CVE-2022-26700 CVE-2022-26766 CVE-2022-23308 CVE-2022-26706 CVE-2022-26765 CVE-2022-26764 CVE-2022-26714 CVE-2022-26702 CVE-2022-26771 CVE-2022-26768 CVE-2022-26701 CVE-2022-26711 CVE-2022-26763 CVE-2022-26740 CVE-2022-26739 CVE-2022-26738 CVE-2022-26737 CVE-2022-26736 CVE-2022-22675 CVE-2022-26724 CVE-2022-26708 CVE-2022-26775 CVE-2022-26776 CVE-2022-32790 |
CWE-ID | CWE-416 CWE-119 CWE-310 CWE-264 CWE-362 CWE-190 CWE-787 CWE-287 CWE-20 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #5 is available. Public exploit code for vulnerability #9 is available. Public exploit code for vulnerability #20 is available. Vulnerability #26 is being exploited in the wild. |
Vulnerable software Subscribe |
tvOS Operating systems & Components / Operating system |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains information about 31 vulnerabilities.
EUVDB-ID: #VU63258
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26757
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the OS kernel subsystem. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63286
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26745
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to a boundary error in Wi-Fi component. A local application can gain read access to restricted memory.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63284
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26719
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63283
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26716
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63282
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26717
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63281
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26710
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63280
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26709
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63279
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26700
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63271
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26766
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to bypass signature validation.
The vulnerability exists due to a certificate parsing issue in the Security subsystem. A local application can bypass signature validation.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU60922
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-23308
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing ID and IDREF attributes in valid.c. A remote attacker can pass specially crafted XML input to the application, trigger a use-after-free error and crash the application or execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63261
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26706
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to bypass sandbox restrictions.
The vulnerability exists due to sandbox bypass in LaunchServices. A local application can circumvent sandbox restrictions.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63260
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26765
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the OS kernel subsystem. A local user can exploit the race to bypass Pointer Authentication.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63259
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26764
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel subsystem. A local user can trigger memory corruption and bypass kernel memory mitigations to execute arbitrary code.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63257
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26714
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the OS kernel subsystem. A local user can trigger memory corruption and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63291
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26702
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in AppleAVD. A local application can execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63293
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26771
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63255
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26768
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in IOMobileFrameBuffer. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63254
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26701
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in IOKit. A local application can exploit the race and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63247
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26711
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow when parsing WebP images in the ImageIO framework. A remote attacker can trick the victim into opening a specially crafted file, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63246
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26763
CWE-ID:
Exploit availability:
Description The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in DriverKit. A local application can execute arbitrary code with system privileges.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63242
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26740
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in AVEVideoEncoder. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63241
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26739
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in AVEVideoEncoder. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63240
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26738
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in AVEVideoEncoder. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63239
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26737
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in AVEVideoEncoder. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63238
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26736
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in AVEVideoEncoder. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU61773
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-22675
CWE-ID:
Exploit availability:
Description The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the AppleAVD subsystem. A local user can run a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with kernel privileges.
Note, the vulnerability is being actively exploited in the wild.
Install update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63298
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-26724
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to an error in AuthKit. A local user can enable iCloud Photos without authentication.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63264
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26708
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input in libresolv. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63265
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26775
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in libresolv. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63263
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-26776
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input in libresolv. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU64839
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-32790
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in libresolv. A remote attacker can pass specially crafted DNS response to the systen and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionstvOS: 15.0 19J346 - 15.4.1 19L452
Fixed software versionsCPE2.3 External links
http://support.apple.com/en-us/HT213254
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?