{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-46689","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-04-21T15:21:15.921Z","dateReserved":"2022-12-07T00:00:00.000Z","datePublished":"2022-12-15T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2022-12-21T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges."}],"affected":[{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","lessThan":"11.7","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"16.2","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"13.1","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"12.6","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"16.2","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"tvOS","versions":[{"version":"unspecified","lessThan":"15.7","status":"affected","versionType":"custom"}]},{"vendor":"Apple","product":"watchOS","versions":[{"version":"unspecified","lessThan":"9.2","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://support.apple.com/en-us/HT213535"},{"url":"https://support.apple.com/en-us/HT213532"},{"url":"https://support.apple.com/en-us/HT213530"},{"url":"https://support.apple.com/en-us/HT213531"},{"url":"https://support.apple.com/en-us/HT213536"},{"url":"https://support.apple.com/en-us/HT213534"},{"url":"https://support.apple.com/en-us/HT213533"},{"name":"20221220 APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"name":"20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"name":"20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/25"},{"name":"20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/23"},{"name":"20221220 APPLE-SA-2022-12-13-7 tvOS 16.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"name":"20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/24"},{"name":"20221220 APPLE-SA-2022-12-13-8 watchOS 9.2","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"An app may be able to execute arbitrary code with kernel privileges"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:39:38.273Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213535","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213532","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213530","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213531","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213536","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213534","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213533","tags":["x_transferred"]},{"name":"20221220 APPLE-SA-2022-12-13-1 iOS 16.2 and iPadOS 16.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/20"},{"name":"20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/21"},{"name":"20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/25"},{"name":"20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/23"},{"name":"20221220 APPLE-SA-2022-12-13-7 tvOS 16.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/26"},{"name":"20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/24"},{"name":"20221220 APPLE-SA-2022-12-13-8 watchOS 9.2","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Dec/27"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-362","lang":"en","description":"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"HIGH","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-21T15:19:45.875718Z","id":"CVE-2022-46689","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T15:21:15.921Z"}}]}}