Last Modified: Dec. 21, 2022
A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1..
Tweets last week: 10
Remaining steady
Yahoo results: 2390000
Strongly raising
Current EPSS Score: 0.02806
Remaining steady
Reddit Posts: 7
Remaining steady
Github Repos: 1
Remaining steady
Found exploits:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Base Score: 8.8
Exploitability Score:
2.8
Impact Score: 5.9
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-843
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* Part: o Vendor: apple | Alle Schwachstellen für apple | |
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* Part: o Vendor: apple | Alle Schwachstellen für apple | |
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* Part: o Vendor: apple | Alle Schwachstellen für apple | |
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* Part: o Vendor: apple | Alle Schwachstellen für apple | |
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* Part: o Vendor: apple | Alle Schwachstellen für apple | |
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* Part: a Vendor: apple | Alle Schwachstellen für apple |
Reference:
added:
http://seclists.org/fulldisclosure/2022/Dec/26
http://seclists.org/fulldisclosure/2022/Dec/28
http://seclists.org/fulldisclosure/2022/Dec/21
http://seclists.org/fulldisclosure/2022/Dec/22
http://seclists.org/fulldisclosure/2022/Dec/23
CWE-ID:
Not defined
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
Reference:
added:
http://www.openwall.com/lists/oss-security/2022/12/26/1
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"/> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> </set>