{"api_version":"1","generated_at":"2026-04-23T01:00:15+00:00","cve":"CVE-2022-22628","urls":{"html":"https://cve.report/CVE-2022-22628","api":"https://cve.report/api/cve/CVE-2022-22628.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-22628","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-22628"},"summary":{"title":"CVE-2022-22628","description":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2022-09-23 19:15:00","updated_at":"2022-09-28 12:06:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213182","name":"https://support.apple.com/en-us/HT213182","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.4 and iPadOS 15.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213183","name":"https://support.apple.com/en-us/HT213183","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213186","name":"https://support.apple.com/en-us/HT213186","refsource":"MISC","tags":[],"title":"About the security content of tvOS 15.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213187","name":"https://support.apple.com/en-us/HT213187","refsource":"MISC","tags":[],"title":"About the security content of Safari 15.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213193","name":"https://support.apple.com/en-us/HT213193","refsource":"MISC","tags":[],"title":"About the security content of watchOS 8.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-22628","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22628","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"22628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipad_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"22628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"22628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"22628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"22628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"22628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-22628","qid":"160217","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2022-7704)"},{"cve":"CVE-2022-22628","qid":"160305","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2022-8054)"},{"cve":"CVE-2022-22628","qid":"179177","title":"Debian Security Update for wpewebkit (DSA 5116-1)"},{"cve":"CVE-2022-22628","qid":"179178","title":"Debian Security Update for webkit2gtk (DSA 5115-1)"},{"cve":"CVE-2022-22628","qid":"182854","title":"Debian Security Update for webkit2gtkwpewebkit (CVE-2022-22628)"},{"cve":"CVE-2022-22628","qid":"198756","title":"Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-5394-1)"},{"cve":"CVE-2022-22628","qid":"240833","title":"Red Hat Update for webkit2gtk3 (RHSA-2022:7704)"},{"cve":"CVE-2022-22628","qid":"240910","title":"Red Hat Update for webkit2gtk3 (RHSA-2022:8054)"},{"cve":"CVE-2022-22628","qid":"376475","title":"Apple Safari Multiple Vulnerabilities (HT213187)"},{"cve":"CVE-2022-22628","qid":"376485","title":"Apple MacOS Monterey 12.3 Not Installed (HT213183)"},{"cve":"CVE-2022-22628","qid":"502399","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2022-22628","qid":"505528","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2022-22628","qid":"610404","title":"Apple iOS 15.4 and iPadOS 15.4 Security Update Missing"},{"cve":"CVE-2022-22628","qid":"710613","title":"Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 202208-39)"},{"cve":"CVE-2022-22628","qid":"752080","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:1431-1)"},{"cve":"CVE-2022-22628","qid":"752104","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:1511-1)"},{"cve":"CVE-2022-22628","qid":"752124","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:1677-1)"},{"cve":"CVE-2022-22628","qid":"940779","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2022:7704)"},{"cve":"CVE-2022-22628","qid":"940844","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2022:8054)"},{"cve":"CVE-2022-22628","qid":"960171","title":"Rocky Linux Security Update for webkit2gtk3 (RLSA-2022:7704)"},{"cve":"CVE-2022-22628","qid":"960649","title":"Rocky Linux Security Update for webkit2gtk3 (RLSA-2022:8054)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-22628","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"Safari","version":{"version_data":[{"version_affected":"<","version_value":"15.4"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"15.4"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"12.3"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"15.4"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"8.5"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing maliciously crafted web content may lead to arbitrary code execution"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213182","name":"https://support.apple.com/en-us/HT213182"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213193","name":"https://support.apple.com/en-us/HT213193"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213183","name":"https://support.apple.com/en-us/HT213183"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213186","name":"https://support.apple.com/en-us/HT213186"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213187","name":"https://support.apple.com/en-us/HT213187"}]},"description":{"description_data":[{"lang":"eng","value":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution."}]}},"nvd":{"publishedDate":"2022-09-23 19:15:00","lastModifiedDate":"2022-09-28 12:06:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"15.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"8.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndExcluding":"15.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"22628","Ordinal":"225045","Title":"CVE-2022-22628","CVE":"CVE-2022-22628","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"22628","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}