CVE-2022-48618

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.
References
Link Resource
https://support.apple.com/en-us/HT213530 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213530 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory

29 Feb 2024, 17:46

Type Values Removed Values Added
CWE CWE-287 CWE-367
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.0

16 Jan 2024, 18:37

Type Values Removed Values Added
CPE cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
CWE CWE-287
References () https://support.apple.com/en-us/HT213530 - () https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213532 - () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213535 - () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213536 - () https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory
Summary
  • (es) El problema se solucionó con controles mejorados. Este problema se solucionó en macOS Ventura 13.1, watchOS 9.2, iOS 16.2 y iPadOS 16.2, tvOS 16.2. Un atacante con capacidad de lectura y escritura arbitraria puede eludir la autenticación de puntero. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado en versiones de iOS lanzadas antes de iOS 15.7.1.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Apple watchos
Apple tvos
Apple ipados
Apple macos
Apple iphone Os
Apple

09 Jan 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-09 18:15

Updated : 2025-02-14 16:20


NVD link : CVE-2022-48618

Mitre link : CVE-2022-48618

CVE.ORG link : CVE-2022-48618


JSON object : View

Products Affected

apple

  • ipados
  • tvos
  • macos
  • iphone_os
  • watchos
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition