CVE-2022-46695
Published on: Not Yet Published
Last Modified on: 01/09/2023 04:50:00 PM UTC
Certain versions of Ipados from Apple contain the following vulnerability:
A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. This issue is fixed in tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Visiting a website that frames malicious content may lead to UI spoofing.
- CVE-2022-46695 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Apple - tvOS version < 16.2
- Affected Vendor/Software:
Apple - tvOS version < 13.1
- Affected Vendor/Software:
Apple - tvOS version < 16.2
- Affected Vendor/Software:
Apple - tvOS version < 15.7
- Affected Vendor/Software:
Apple - watchOS version < 9.2
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | HIGH | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Full Disclosure: APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2 | seclists.org text/html |
![]() |
Full Disclosure: APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2 | seclists.org text/html |
![]() |
About the security content of tvOS 16.2 - Apple Support | support.apple.com text/html |
![]() |
About the security content of macOS Ventura 13.1 - Apple Support | support.apple.com text/html |
![]() |
Full Disclosure: APPLE-SA-2022-12-13-4 macOS Ventura 13.1 | seclists.org text/html |
![]() |
No Description Provided | seclists.org Inactive LinkNot Archived |
![]() |
About the security content of iOS 16.2 and iPadOS 16.2 - Apple Support | support.apple.com text/html |
![]() |
About the security content of iOS 15.7.2 and iPadOS 15.7.2 - Apple Support | support.apple.com text/html |
![]() |
About the security content of watchOS 9.2 - Apple Support | support.apple.com text/html |
![]() |
Related QID Numbers
Exploit/POC from Github
This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file i…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Apple | Ipados | All | All | All | All |
Operating System | Apple | Iphone Os | All | All | All | All |
Operating System | Apple | Macos | All | All | All | All |
Operating System | Apple | Tvos | All | All | All | All |
Operating System | Apple | Watchos | All | All | All | All |
- cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution - PATCH: NOW | 2022-12-14 15:20:38 |