{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-42845","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-04-21T15:11:14.315Z","dateReserved":"2022-10-11T00:00:00.000Z","datePublished":"2022-12-15T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2022-12-21T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The issue was addressed with improved memory handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app with root privileges may be able to execute arbitrary code with kernel privileges."}],"affected":[{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","lessThan":"11.7","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"16.2","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"13.1","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"12.6","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"16.2","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"unspecified","lessThan":"9.2","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://support.apple.com/en-us/HT213535"},{"url":"https://support.apple.com/en-us/HT213532"},{"url":"https://support.apple.com/en-us/HT213530"},{"url":"https://support.apple.com/en-us/HT213536"},{"url":"https://support.apple.com/en-us/HT213534"},{"url":"https://support.apple.com/en-us/HT213533"},{"name":"20221220 APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"name":"20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/25"},{"name":"20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/23"},{"name":"20221220 APPLE-SA-2022-12-13-7 tvOS 16.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"name":"20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/24"},{"name":"20221220 APPLE-SA-2022-12-13-8 watchOS 9.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"An app with root privileges may be able to execute arbitrary code with kernel privileges"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:19:05.207Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213535","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213532","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213530","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213536","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213534","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213533","tags":["x_transferred"]},{"name":"20221220 APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"name":"20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/25"},{"name":"20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/23"},{"name":"20221220 APPLE-SA-2022-12-13-7 tvOS 16.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"name":"20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/24"},{"name":"20221220 APPLE-SA-2022-12-13-8 watchOS 9.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-787","lang":"en","description":"CWE-787 Out-of-bounds Write"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.2,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-21T15:10:16.370806Z","id":"CVE-2022-42845","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T15:11:14.315Z"}}]}}