← Volver a CVEs
CVE-2022-42799
MEDIUM6.1
Descripcion
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
Detalles CVE
Puntuacion CVSS v3.16.1
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado11/1/2022
Ultima modificacion5/5/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchosdebian:debian_linuxfedoraproject:fedora
Debilidades (CWE)
CWE-1021CWE-1021
Referencias
http://www.openwall.com/lists/oss-security/2022/11/04/4(product-security@apple.com)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(product-security@apple.com)
https://security.gentoo.org/glsa/202305-32(product-security@apple.com)
https://support.apple.com/en-us/HT213488(product-security@apple.com)
https://support.apple.com/en-us/HT213489(product-security@apple.com)
https://support.apple.com/en-us/HT213491(product-security@apple.com)
https://support.apple.com/en-us/HT213492(product-security@apple.com)
https://support.apple.com/en-us/HT213495(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5273(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5274(product-security@apple.com)
http://www.openwall.com/lists/oss-security/2022/11/04/4(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202305-32(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213488(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213489(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213491(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213492(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213495(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5273(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5274(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.