CVE-2022-26766
Published on: Not Yet Published
Last Modified on: 06/08/2022 12:42:00 PM UTC
Certain versions of Ipados from Apple contain the following vulnerability:
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
- CVE-2022-26766 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | HIGH | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
About the security content of Security Update 2022-004 Catalina - Apple Support | support.apple.com text/html |
![]() |
About the security content of tvOS 15.5 - Apple Support | support.apple.com text/html |
![]() |
About the security content of watchOS 8.6 - Apple Support | support.apple.com text/html |
![]() |
About the security content of iOS 15.5 and iPadOS 15.5 - Apple Support | support.apple.com text/html |
![]() |
About the security content of macOS Big Sur 11.6.6 - Apple Support | support.apple.com text/html |
![]() |
About the security content of macOS Monterey 12.4 - Apple Support | support.apple.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Apple | Ipados | All | All | All | All |
Operating System | Apple | Iphone Os | All | All | All | All |
Operating System | Apple | Macos | All | All | All | All |
Operating System | Apple | Mac Os X | All | All | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | - | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2020-001 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-001 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-002 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-003 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-004 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-005 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-006 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-007 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2021-008 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2022-001 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2022-002 | All | All |
Operating System | Apple | Mac Os X | 10.15.7 | security_update_2022-003 | All | All |
Operating System | Apple | Tvos | All | All | All | All |
Operating System | Apple | Watchos | All | All | All | All |
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*:
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
@LinusHenze Congratz Linus! I'm especially curious about CVE-2022-26766. ? | 2022-05-16 22:51:39 |
![]() |
IT Risk: Apple.iOS 15.5,iPadOS 15.5のリリース情報が公開されました -5/5 CVE-2022-26731 CVE-2022-26766 CVE-2022-26703 CVE-2022-26700… twitter.com/i/web/status/1… | 2022-05-16 23:29:42 |
![]() |
@zhuowei I’m really interested in hearing about what CVE-2022-26766 was support.apple.com/en-us/HT213258 ? Especially because of who found it | 2022-05-17 02:20:00 |
![]() |
I can't figure out CVE-2022-26766, Linus Henze's codesigning bug. @littlelailo taught me what it is - CoreTrust doe… twitter.com/i/web/status/1… | 2022-05-23 04:34:15 |
![]() |
CVE-2022-26766 : A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5,… twitter.com/i/web/status/1… | 2022-05-26 20:14:21 |
![]() |
MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution - PATCH: NOW | 2022-05-17 13:11:14 |
![]() |
UPDATED MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution - PATCH: NOW | 2022-05-18 14:59:44 |
![]() |
CVE-2022-26766 | 2022-05-26 21:39:02 |
![]() |
Get root on macOS 12.3.1: proof-of-concepts for Linus Henze’s CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763) | Worth Doing Badly | 2022-07-02 18:38:24 |
![]() |
Get root on macOS 12.3.1: proof-of-concepts for Linus Henze’s CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763) | 2022-07-03 15:37:37 |
![]() |
Get root on macOS 12.3.1: proof-of-concepts for Linus Henze’s CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763) | 2022-07-04 09:22:34 |