PT-2022-7264 · Apple · Ipados +4
Adam M
·
Published
2022-12-13
·
Updated
2024-08-14
·
CVE-2022-48618
7.0
High
Base vector | Vector | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
macOS versions prior to 13.1
watchOS versions prior to 9.2
iOS versions prior to 16.2
iPadOS versions prior to 16.2
tvOS versions prior to 16.2
Description:
The issue is related to a bug in the kernel component that can bypass "pointer authentication." An attacker with arbitrary read and write capability may be able to exploit this issue. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.
Recommendations:
For macOS versions prior to 13.1, update to macOS Ventura 13.1.
For watchOS versions prior to 9.2, update to watchOS 9.2.
For iOS versions prior to 16.2, update to iOS 16.2.
For iPadOS versions prior to 16.2, update to iPadOS 16.2.
For tvOS versions prior to 16.2, update to tvOS 16.2.
Fix
Improper Authentication
Time Of Check To Time Of Use
Related Identifiers
Affected Products
References · 37
- https://support.apple.com/en-us/HT213535 · Security Note, Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-48618 · Security Note
- https://support.apple.com/en-us/HT213536 · Security Note, Vendor Advisory
- https://bdu.fstec.ru/vul/2024-01301 · Security Note
- https://support.apple.com/en-us/HT213530 · Security Note, Vendor Advisory
- https://support.apple.com/en-us/HT213532 · Security Note, Vendor Advisory
- https://twitter.com/a91_pr0xy/status/1758577462886256991 · Twitter Post
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48618 · Note
- https://twitter.com/inthewildio/status/1752776626671104437 · Twitter Post
- https://twitter.com/Shasank910554/status/1753273904670687300 · Twitter Post
- https://twitter.com/ExtremaRatio4/status/1753303033323344081 · Twitter Post
- https://twitter.com/CVEnew/status/1744785183088210069 · Twitter Post
- https://twitter.com/SecTicks/status/1754092352296169594 · Twitter Post
- https://twitter.com/fletch_ai/status/1753117786170155506 · Twitter Post
- https://twitter.com/DMFezzaReedCISA/status/1753450897928015886 · Twitter Post