{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-32844","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-03-11T19:42:23.086Z","dateReserved":"2022-06-09T00:00:00.000Z","datePublished":"2023-02-27T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2023-02-27T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication."}],"affected":[{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"15.6","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"unspecified","lessThan":"8.7","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"unspecified","lessThan":"15.6","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"unspecified","lessThan":"15.6","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://support.apple.com/en-us/HT213340"},{"url":"https://support.apple.com/en-us/HT213342"},{"url":"https://support.apple.com/en-us/HT213346"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T07:54:03.026Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213340","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213342","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213346","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-362","lang":"en","description":"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.3,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-11T19:41:29.243251Z","id":"CVE-2022-32844","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-11T19:42:23.086Z"}}]}}