Apple Products Multiple Vulnerabilities
RISK: High Risk
TYPE: Operating Systems - Mobile & Apps
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, spoofing, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.
Note:
For CVE-2022-42827, Apple is aware of a report that this issue may have been actively exploited.
Impact
- Denial of Service
- Elevation of Privilege
- Spoofing
- Remote Code Execution
- Information Disclosure
- Data Manipulation
- Security Restriction Bypass
System / Technologies affected
- Versions prior to iOS 15.7.1 and iPadOS 15.7.1
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- iOS 15.7.1 and iPadOS 15.7.1
Vulnerability Identifier
- CVE-2022-32923
- CVE-2022-32926
- CVE-2022-32927
- CVE-2022-32929
- CVE-2022-32932
- CVE-2022-32935
- CVE-2022-32939
- CVE-2022-32941
- CVE-2022-32944
- CVE-2022-32949
- CVE-2022-37434
- CVE-2022-42798
- CVE-2022-42800
- CVE-2022-42801
- CVE-2022-42803
- CVE-2022-42810
- CVE-2022-42817
- CVE-2022-42827
Source
Related Link
Related Tags
Share with