← Back to CVEs
CVE-2022-42799
MEDIUM6.1
Description
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
CVE Details
CVSS v3.1 Score6.1
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published11/1/2022
Last Modified5/5/2025
Sourcenvd
Honeypot Sightings0
Affected Products
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchosdebian:debian_linuxfedoraproject:fedora
Weaknesses (CWE)
CWE-1021CWE-1021
References
http://www.openwall.com/lists/oss-security/2022/11/04/4(product-security@apple.com)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(product-security@apple.com)
https://security.gentoo.org/glsa/202305-32(product-security@apple.com)
https://support.apple.com/en-us/HT213488(product-security@apple.com)
https://support.apple.com/en-us/HT213489(product-security@apple.com)
https://support.apple.com/en-us/HT213491(product-security@apple.com)
https://support.apple.com/en-us/HT213492(product-security@apple.com)
https://support.apple.com/en-us/HT213495(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5273(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5274(product-security@apple.com)
http://www.openwall.com/lists/oss-security/2022/11/04/4(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202305-32(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213488(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213489(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213491(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213492(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213495(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5273(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5274(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.