CVE-2022-26765
Published on: Not Yet Published
Last Modified on: 06/08/2022 02:19:00 PM UTC
Certain versions of Ipados from Apple contain the following vulnerability:
A race condition was addressed with improved state handling. This issue is fixed in watchOS 8.6, tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
- CVE-2022-26765 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Apple - watchOS version < 8.6
- Affected Vendor/Software:
Apple - watchOS version < 15.5
- Affected Vendor/Software:
Apple - watchOS version < 12.4
- Affected Vendor/Software:
Apple - watchOS version < 15.5
CVSS3 Score: 4.7 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | HIGH | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | HIGH | NONE |
CVSS2 Score: 1.9 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
About the security content of tvOS 15.5 - Apple Support | support.apple.com text/html |
![]() |
About the security content of watchOS 8.6 - Apple Support | support.apple.com text/html |
![]() |
About the security content of iOS 15.5 and iPadOS 15.5 - Apple Support | support.apple.com text/html |
![]() |
About the security content of macOS Monterey 12.4 - Apple Support | support.apple.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Apple | Ipados | All | All | All | All |
Operating System | Apple | Iphone Os | All | All | All | All |
Operating System | Apple | Macos | All | All | All | All |
Operating System | Apple | Tvos | All | All | All | All |
Operating System | Apple | Watchos | All | All | All | All |
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-26765 : A race condition was addressed with improved state handling. This issue is fixed in watchOS 8.6, t… twitter.com/i/web/status/1… | 2022-05-26 20:14:06 |
![]() |
CVEnew: CVE-2022-26765 A race condition was addressed with improved state handling. This issue is fixed in watchOS… twitter.com/i/web/status/1… | 2022-05-27 07:11:30 |
![]() |
MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution - PATCH: NOW | 2022-05-17 13:11:14 |
![]() |
UPDATED MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution - PATCH: NOW | 2022-05-18 14:59:44 |
![]() |
CVE-2022-26765 | 2022-05-26 21:39:02 |