{"api_version":"1","generated_at":"2026-04-23T01:19:42+00:00","cve":"CVE-2022-32844","urls":{"html":"https://cve.report/CVE-2022-32844","api":"https://cve.report/api/cve/CVE-2022-32844.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-32844","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-32844"},"summary":{"title":"CVE-2022-32844","description":"A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-02-27 20:15:00","updated_at":"2023-08-08 14:22:00"},"problem_types":["CWE-362"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213342","name":"https://support.apple.com/en-us/HT213342","refsource":"MISC","tags":[],"title":"About the security content of tvOS 15.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213346","name":"https://support.apple.com/en-us/HT213346","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.6 and iPadOS 15.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213340","name":"https://support.apple.com/en-us/HT213340","refsource":"MISC","tags":[],"title":"About the security content of watchOS 8.7 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-32844","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32844","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"32844","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32844","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32844","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32844","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-32844","qid":"610425","title":"Apple iOS 15.6 and iPadOS 15.6 Security Update Missing"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-32844","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"15.6"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"8.7"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"15.6"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"15.6"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213340","name":"https://support.apple.com/en-us/HT213340"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213342","name":"https://support.apple.com/en-us/HT213342"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213346","name":"https://support.apple.com/en-us/HT213346"}]},"description":{"description_data":[{"lang":"eng","value":"A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication."}]}},"nvd":{"publishedDate":"2023-02-27 20:15:00","lastModifiedDate":"2023-08-08 14:22:00","problem_types":["CWE-362"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"8.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"15.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}