{"containers":{"cna":{"affected":[{"product":"Safari (v and )","vendor":"Apple","versions":[{"lessThan":"15.3","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"12.2","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"15.3","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."}],"problemTypes":[{"descriptions":[{"description":"Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-09-01T02:06:59.000Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213091"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213092"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213093"},{"name":"GLSA-202208-39","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/202208-39"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"product-security@apple.com","ID":"CVE-2022-22620","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Safari (v and )","version":{"version_data":[{"version_affected":"<","version_value":"15.3"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"12.2"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"15.3"}]}}]},"vendor_name":"Apple"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."}]}]},"references":{"reference_data":[{"name":"https://support.apple.com/en-us/HT213091","refsource":"MISC","url":"https://support.apple.com/en-us/HT213091"},{"name":"https://support.apple.com/en-us/HT213092","refsource":"MISC","url":"https://support.apple.com/en-us/HT213092"},{"name":"https://support.apple.com/en-us/HT213093","refsource":"MISC","url":"https://support.apple.com/en-us/HT213093"},{"name":"GLSA-202208-39","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/202208-39"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:21:48.906Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213091"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213092"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213093"},{"name":"GLSA-202208-39","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/202208-39"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-22620","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-01-29T16:36:15.439176Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-02-11","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22620","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-416","description":"CWE-416 Use After Free"}]}],"timeline":[{"time":"2022-02-11T00:00:00.000Z","lang":"en","value":"CVE-2022-22620 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:15:43.749Z"}}]},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2022-22620","datePublished":"2022-03-18T17:59:40.000Z","dateReserved":"2022-01-05T00:00:00.000Z","dateUpdated":"2025-10-21T23:15:43.749Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}