ID: CVE-2022-42856

Last Modified: Dec. 21, 2022

A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1..

Twitter Activity

Tweets last week: 10

Remaining steady

Yahoo Activity

Yahoo results: 2390000

Strongly raising

EPSS History

Current EPSS Score: 0.02806

Remaining steady


Reddit Activity

Reddit Posts: 7

Remaining steady

Github Repos

Github Repos: 1

Remaining steady

Exploits

Found exploits:

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: Required

Scope: Unchanged

Confidentiality: High

Integrity: High

Availability: High

Base Score: 8.8

Exploitability Score: 2.8

Impact Score: 5.9

CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Specialize CVSS-Score

CWE-843

Condition Configuration
OR
OR
Alle Schwachstellen für apple
Alle Schwachstellen für apple
Alle Schwachstellen für apple
Alle Schwachstellen für apple
Alle Schwachstellen für apple
Alle Schwachstellen für apple
Date: Dec. 21, 2022

Reference:
added:
http://seclists.org/fulldisclosure/2022/Dec/26
http://seclists.org/fulldisclosure/2022/Dec/28
http://seclists.org/fulldisclosure/2022/Dec/21
http://seclists.org/fulldisclosure/2022/Dec/22
http://seclists.org/fulldisclosure/2022/Dec/23



Date: Dec. 21, 2022

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*



Date: Dec. 26, 2022

Reference:
added:
http://www.openwall.com/lists/oss-security/2022/12/26/1



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="operating_system" value="cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="operating_system" value="cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/>
        <prop key="application" value="cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>