{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-32886","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-05-29T14:14:14.900Z","dateReserved":"2022-06-09T00:00:00.000Z","datePublished":"2022-09-20T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2023-05-30T05:10:49.698Z"},"descriptions":[{"lang":"en","value":"A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution."}],"affected":[{"vendor":"Apple","product":"iOS","versions":[{"version":"unspecified","lessThan":"16","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"Safari","versions":[{"version":"unspecified","lessThan":"16","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"iOS and iPadOS","versions":[{"version":"unspecified","lessThan":"15.7","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://support.apple.com/en-us/HT213446"},{"url":"https://support.apple.com/en-us/HT213445"},{"url":"https://support.apple.com/en-us/HT213442"},{"name":"FEDORA-2022-0c00617967","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/"},{"name":"FEDORA-2022-a77b646471","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/"},{"name":"FEDORA-2022-ece798a8d4","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/"},{"name":"DSA-5240","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5240"},{"name":"DSA-5241","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5241"},{"name":"[debian-lts-announce] 20220929 [SECURITY] [DLA 3124-1] webkit2gtk security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html"},{"name":"20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"name":"20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"name":"20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Oct/39"},{"url":"https://security.gentoo.org/glsa/202305-32"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Processing maliciously crafted web content may lead to arbitrary code execution"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T07:54:03.135Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213446","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213445","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213442","tags":["x_transferred"]},{"name":"FEDORA-2022-0c00617967","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/"},{"name":"FEDORA-2022-a77b646471","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/"},{"name":"FEDORA-2022-ece798a8d4","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/"},{"name":"DSA-5240","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5240"},{"name":"DSA-5241","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5241"},{"name":"[debian-lts-announce] 20220929 [SECURITY] [DLA 3124-1] webkit2gtk security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html"},{"name":"20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"name":"20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"name":"20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Oct/39"},{"url":"https://security.gentoo.org/glsa/202305-32","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-787","lang":"en","description":"CWE-787 Out-of-bounds Write"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-29T14:14:06.908362Z","id":"CVE-2022-32886","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-29T14:14:14.900Z"}}]}}