Vulnerability Details : CVE-2022-32893
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Vulnerability category: Memory Corruption
CVE-2022-32893
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Apple iOS and macOS Out-of-Bounds Write Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Apple iOS and macOS contain an out-of-bounds write vulnerability that could allow for remote code execution when processing malicious crafted web content.
Notes:
https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413
Added on
2022-08-18
Action due date
2022-09-08
Exploit prediction scoring system (EPSS) score for CVE-2022-32893
Probability of exploitation activity in the next 30 days: 0.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 66 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-32893
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
[email protected] |
CWE ids for CVE-2022-32893
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: [email protected] (Primary)
References for CVE-2022-32893
-
http://www.openwall.com/lists/oss-security/2022/08/29/1
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/09/13/1
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/08/26/2
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/08/29/2
Mailing List;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5219
Third Party Advisory
-
https://support.apple.com/en-us/HT213413
Vendor Advisory
-
https://support.apple.com/en-us/HT213412
Vendor Advisory
-
http://seclists.org/fulldisclosure/2022/Aug/16
Mailing List;Third Party Advisory
-
https://support.apple.com/en-us/HT213414
Vendor Advisory
-
http://seclists.org/fulldisclosure/2022/Oct/49
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/08/25/5
Mailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
Mailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202208-39
Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/09/02/10
Mailing List;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5220
Third Party Advisory
Products affected by CVE-2022-32893
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
- cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*