{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-42801","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-04-22T14:59:05.736Z","dateReserved":"2022-10-11T00:00:00.000Z","datePublished":"2022-11-01T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2022-11-25T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A logic issue was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1. An app may be able to execute arbitrary code with kernel privileges."}],"affected":[{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","lessThan":"13","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"16.1","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"16.1","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"12.6","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"15.7","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"unspecified","lessThan":"9.1","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://support.apple.com/en-us/HT213488"},{"url":"https://support.apple.com/en-us/HT213494"},{"url":"https://support.apple.com/en-us/HT213489"},{"url":"https://support.apple.com/en-us/HT213492"},{"url":"https://support.apple.com/en-us/HT213491"},{"url":"https://support.apple.com/en-us/HT213490"},{"url":"http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"An app may be able to execute arbitrary code with kernel privileges"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:19:04.584Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213488","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213494","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213489","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213492","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213491","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213490","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-693","lang":"en","description":"CWE-693 Protection Mechanism Failure"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-22T14:57:30.350662Z","id":"CVE-2022-42801","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-22T14:59:05.736Z"}}]}}