Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-42824
PUBLISHED
More InfoOfficial Page
Assigner-apple
Assigner Org ID-286789f9-fbc2-4510-9f9a-43facdede74c
View Known Exploited Vulnerability (KEV) details
Published At-01 Nov, 2022 | 00:00
Updated At-21 Apr, 2025 | 15:32
Rejected At-
▼CVE Numbering Authority (CNA)

A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose sensitive user information.

Affected Products
Vendor
Apple Inc.Apple
Product
macOS
Versions
Affected
  • From unspecified before 13 (custom)
Vendor
Apple Inc.Apple
Product
tvOS
Versions
Affected
  • From unspecified before 16.1 (custom)
Vendor
Apple Inc.Apple
Product
tvOS
Versions
Affected
  • From unspecified before 16.1 (custom)
Vendor
Apple Inc.Apple
Product
tvOS
Versions
Affected
  • From unspecified before 16.1 (custom)
Vendor
Apple Inc.Apple
Product
watchOS
Versions
Affected
  • From unspecified before 9.1 (custom)
Problem Types
TypeCWE IDDescription
textN/AProcessing maliciously crafted web content may disclose sensitive user information
Type: text
CWE ID: N/A
Description: Processing maliciously crafted web content may disclose sensitive user information
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/HT213488
N/A
https://support.apple.com/en-us/HT213489
N/A
https://support.apple.com/en-us/HT213492
N/A
https://support.apple.com/en-us/HT213495
N/A
https://support.apple.com/en-us/HT213491
N/A
http://www.openwall.com/lists/oss-security/2022/11/04/4
mailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
vendor-advisory
https://www.debian.org/security/2022/dsa-5273
vendor-advisory
https://www.debian.org/security/2022/dsa-5274
vendor-advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
mailing-list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
vendor-advisory
https://security.gentoo.org/glsa/202305-32
vendor-advisory
Hyperlink: https://support.apple.com/en-us/HT213488
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213489
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213492
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213495
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213491
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2022/11/04/4
Resource:
mailing-list
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
Resource:
vendor-advisory
Hyperlink: https://www.debian.org/security/2022/dsa-5273
Resource:
vendor-advisory
Hyperlink: https://www.debian.org/security/2022/dsa-5274
Resource:
vendor-advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
Resource:
mailing-list
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
Resource:
vendor-advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
Resource:
vendor-advisory
Hyperlink: https://security.gentoo.org/glsa/202305-32
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/HT213488
x_transferred
https://support.apple.com/en-us/HT213489
x_transferred
https://support.apple.com/en-us/HT213492
x_transferred
https://support.apple.com/en-us/HT213495
x_transferred
https://support.apple.com/en-us/HT213491
x_transferred
http://www.openwall.com/lists/oss-security/2022/11/04/4
mailing-list
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
vendor-advisory
x_transferred
https://www.debian.org/security/2022/dsa-5273
vendor-advisory
x_transferred
https://www.debian.org/security/2022/dsa-5274
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
mailing-list
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
vendor-advisory
x_transferred
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
vendor-advisory
x_transferred
https://security.gentoo.org/glsa/202305-32
vendor-advisory
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213488
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213489
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213492
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213495
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213491
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2022/11/04/4
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.debian.org/security/2022/dsa-5273
Resource:
vendor-advisory
x_transferred
Hyperlink: https://www.debian.org/security/2022/dsa-5274
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
Resource:
mailing-list
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202305-32
Resource:
vendor-advisory
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found