CVE-2022-46692

A logic issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may bypass Same Origin Policy.
References
Link Resource
http://seclists.org/fulldisclosure/2022/Dec/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/28 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202305-32
https://support.apple.com/en-us/HT213530 Vendor Advisory
https://support.apple.com/en-us/HT213531 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Vendor Advisory
https://support.apple.com/en-us/HT213537 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213538 Vendor Advisory
http://seclists.org/fulldisclosure/2022/Dec/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/28 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202305-32
https://support.apple.com/en-us/HT213530 Vendor Advisory
https://support.apple.com/en-us/HT213531 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Vendor Advisory
https://support.apple.com/en-us/HT213537 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213538 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Apr 2025, 15:15

Type Values Removed Values Added
CWE CWE-345

21 Nov 2024, 07:30

Type Values Removed Values Added
Summary
  • (es) Se abordó un problema de lógica con una mejor gestión del estado. Este problema se solucionó en Safari 16.2, tvOS 16.2, iCloud para Windows 14.1, iOS 15.7.2 y iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 y iPadOS 16.2, watchOS 9.2. El procesamiento de contenido web creado con fines malintencionados puede eludir la Política del mismo origen.
References () http://seclists.org/fulldisclosure/2022/Dec/20 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/20 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/21 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/21 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/23 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/23 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/26 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/26 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/28 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/28 - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202305-32 - () https://security.gentoo.org/glsa/202305-32 -
References () https://support.apple.com/en-us/HT213530 - Vendor Advisory () https://support.apple.com/en-us/HT213530 - Vendor Advisory
References () https://support.apple.com/en-us/HT213531 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213531 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213536 - Vendor Advisory () https://support.apple.com/en-us/HT213536 - Vendor Advisory
References () https://support.apple.com/en-us/HT213537 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213537 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213538 - Vendor Advisory () https://support.apple.com/en-us/HT213538 - Vendor Advisory

Information

Published : 2022-12-15 19:15

Updated : 2025-04-21 15:15


NVD link : CVE-2022-46692

Mitre link : CVE-2022-46692

CVE.ORG link : CVE-2022-46692


JSON object : View

Products Affected

apple

  • safari
  • iphone_os
  • macos
  • watchos
  • icloud
  • ipados
  • tvos
CWE
NVD-CWE-noinfo CWE-345

Insufficient Verification of Data Authenticity