Vulnerability Details : CVE-2022-26717
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5, iTunes 12.12.4 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2022-26717
Probability of exploitation activity in the next 30 days: 0.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 58 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-26717
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
nvd@nist.gov |
CWE ids for CVE-2022-26717
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-26717
-
https://support.apple.com/en-us/HT213260
About the security content of Safari 15.5 - Apple SupportRelease Notes;Vendor Advisory
-
https://support.apple.com/en-us/HT213254
About the security content of tvOS 15.5 - Apple SupportRelease Notes;Vendor Advisory
-
https://support.apple.com/en-us/HT213253
About the security content of watchOS 8.6 - Apple SupportRelease Notes;Vendor Advisory
-
https://support.apple.com/en-us/HT213258
About the security content of iOS 15.5 and iPadOS 15.5 - Apple SupportRelease Notes;Vendor Advisory
-
https://support.apple.com/en-us/HT213257
About the security content of macOS Monterey 12.4 - Apple SupportRelease Notes;Vendor Advisory
-
https://support.apple.com/en-us/HT213259
About the security content of iTunes 12.12.4 for Windows - Apple SupportRelease Notes;Vendor Advisory
Products affected by CVE-2022-26717
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*