{"containers":{"cna":{"affected":[{"product":"iOS and iPadOS","vendor":"Apple","versions":[{"lessThan":"15.4","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"12.3","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"8.6","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"15.5","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"11.6","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."}],"problemTypes":[{"descriptions":[{"description":"An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-05-26T17:44:27.000Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213256"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213220"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213219"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213253"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT213254"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"product-security@apple.com","ID":"CVE-2022-22675","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_value":"15.4"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"12.3"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"8.6"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"15.5"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"11.6"}]}}]},"vendor_name":"Apple"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited."}]}]},"references":{"reference_data":[{"name":"https://support.apple.com/en-us/HT213256","refsource":"MISC","url":"https://support.apple.com/en-us/HT213256"},{"name":"https://support.apple.com/en-us/HT213220","refsource":"MISC","url":"https://support.apple.com/en-us/HT213220"},{"name":"https://support.apple.com/en-us/HT213219","refsource":"MISC","url":"https://support.apple.com/en-us/HT213219"},{"name":"https://support.apple.com/en-us/HT213253","refsource":"MISC","url":"https://support.apple.com/en-us/HT213253"},{"name":"https://support.apple.com/en-us/HT213254","refsource":"MISC","url":"https://support.apple.com/en-us/HT213254"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:21:48.937Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213256"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213220"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213219"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213253"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT213254"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-22675","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-01-28T21:50:13.043583Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-04-04","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22675"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22675","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"timeline":[{"time":"2022-04-04T00:00:00.000Z","lang":"en","value":"CVE-2022-22675 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:15:39.128Z"}}]},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2022-22675","datePublished":"2022-05-26T17:44:27.000Z","dateReserved":"2022-01-05T00:00:00.000Z","dateUpdated":"2025-10-21T23:15:39.128Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}