Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 21 |
CVE-ID | CVE-2022-42840 CVE-2022-42856 CVE-2022-46700 CVE-2022-46692 CVE-2022-42852 CVE-2022-46691 CVE-2022-46695 CVE-2022-42855 CVE-2022-40304 CVE-2022-40303 CVE-2022-46689 CVE-2022-42837 CVE-2022-42864 CVE-2022-42861 CVE-2022-46694 CVE-2022-42848 CVE-2022-42846 CVE-2022-46703 CVE-2022-46705 CVE-2023-23496 CVE-2022-46718 |
CWE-ID | CWE-119 CWE-843 CWE-254 CWE-125 CWE-451 CWE-371 CWE-399 CWE-190 CWE-362 CWE-20 CWE-269 CWE-787 CWE-200 |
Exploitation vector | Network |
Public exploit |
Vulnerability #2 is being exploited in the wild. Vulnerability #11 is being exploited in the wild. Public exploit code for vulnerability #13 is available. Public exploit code for vulnerability #21 is available. |
Vulnerable software Subscribe |
iPadOS Operating systems & Components / Operating system Apple iOS Operating systems & Components / Operating system |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains information about 21 vulnerabilities.
EUVDB-ID: #VU70228
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42840
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in ppp component. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70195
Risk: Critical
CVSSv3.1:
CVE-ID: CVE-2022-42856
CWE-ID:
CWE-843 - Access of Resource Using Incompatible Type ('Type Confusion')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70240
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-46700
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70236
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46692
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a logic issue in WebKit. A remote attacker can trick the victim to visit a specially crafted web page and bypass Same Origin Policy.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70238
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-42852
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in WebKit. A remote attacker can trick the victim to visit a specially crafted web page, trigger an out-of-bounds read error and read contents of memory on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70235
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-46691
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70231
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46695
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of URLs in Safari. A remote attacker can spoof page content.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70229
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42855
CWE-ID:
CWE-371 - State Issues
Exploit availability: No
DescriptionThe vulnerability allows a local application to gain access to bypass certain security restrictions.
The vulnerability exists due to a state management issue within the Preferences component. A local application can use arbitrary entitlements.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68829
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-40304
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in entities.c due to the way libxml2 handles reference cycles. The library does not anticipate that entity content can be allocated from a dict and clears it upon reference cycle detection by setting its first byte to zero. This can lead to memory corruption issues, such as double free errors and result in a denial of service.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68828
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-40303
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in parse.c when processing content when XML_PARSE_HUGE is set. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70216
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46689
Exploit availability: Yes
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in macOS kernel. A local application can exploit the race and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70215
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-42837
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of URLs in iTunes Store. A remote attacker can trick the victim to open a specially crafted URL and execute arbitrary code on the system.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70211
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42864
Exploit availability: Yes
DescriptionThe vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in IOHIDFamily. A local application can exploit the race and execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70223
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42861
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improper privilege management in macOS kernel. A local application can break out of its sandbox.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70246
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-46694
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted video files in AppleAVD. A remote attacker can create a specially crafted video file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70247
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42848
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local application to escalate privileges on the device.
The vulnerability exists due to improper privilege management in AVEVideoEncoder. A local application can execute arbitrary code with kernel privileges.
Install update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70248
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-42846
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Graphics Driver when processing video files. A remote attacker can trick the victim to open a specially crafted video file and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsiPadOS: 15.0 19A346 - 15.7.1 19H117
Apple iOS: 15.0 19A346 - 15.7.1 19H117
http://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU73801
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46703
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to a logic error in the Weather feature. A local application can obtain sensitive location information.
MitigationInstall update from vendor's website.
Vulnerable software versionshttp://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70514
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-46705
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of URL in WebKit. A remote attacker can spoof the browser's address bar.
Install update from vendor's website.
Vulnerable software versionshttp://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU71451
Risk: High
CVSSv3.1:
CVE-ID: CVE-2023-23496
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionshttp://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU75782
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-46718
CWE-ID:
CWE-200 - Information exposure
Exploit availability: Yes
DescriptionThe vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in TCC. A local application can gain unauthorized access to sensitive information on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionshttp://support.apple.com/en-us/HT213531
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?