The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.
References
| Link | Resource |
|---|---|
| https://support.apple.com/en-us/HT213530 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/HT213532 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/HT213535 | Release Notes Vendor Advisory |
| https://support.apple.com/en-us/HT213536 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Feb 2024, 17:46
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
| CWE | CWE-367 |
16 Jan 2024, 18:37
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-287 | |
| First Time |
Apple macos
Apple Apple ipados Apple tvos Apple watchos Apple iphone Os |
|
| CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
|
| Summary |
|
|
| References | () https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory |
Information
Published : 2024-01-09 18:15
Updated : 2024-04-11 12:48
NVD link : CVE-2022-48618
Mitre link : CVE-2022-48618
CVE.ORG link : CVE-2022-48618
JSON object : View
Products Affected
apple
- ipados
- iphone_os
- macos
- tvos
- watchos
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
