← Zuruck zu CVEs
CVE-2022-42799
MEDIUM6.1
Beschreibung
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
CVE Details
CVSS v3.1 Bewertung6.1
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht11/1/2022
Zuletzt geandert5/5/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchosdebian:debian_linuxfedoraproject:fedora
Schwachen (CWE)
CWE-1021CWE-1021
Referenzen
http://www.openwall.com/lists/oss-security/2022/11/04/4(product-security@apple.com)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(product-security@apple.com)
https://security.gentoo.org/glsa/202305-32(product-security@apple.com)
https://support.apple.com/en-us/HT213488(product-security@apple.com)
https://support.apple.com/en-us/HT213489(product-security@apple.com)
https://support.apple.com/en-us/HT213491(product-security@apple.com)
https://support.apple.com/en-us/HT213492(product-security@apple.com)
https://support.apple.com/en-us/HT213495(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5273(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5274(product-security@apple.com)
http://www.openwall.com/lists/oss-security/2022/11/04/4(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202305-32(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213488(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213489(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213491(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213492(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213495(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5273(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5274(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.