← Retour aux CVEs
CVE-2022-42799
MEDIUM6.1
Description
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
Details CVE
Score CVSS v3.16.1
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie11/1/2022
Derniere modification5/5/2025
Sourcenvd
Observations honeypot0
Produits affectes
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchosdebian:debian_linuxfedoraproject:fedora
Faiblesses (CWE)
CWE-1021CWE-1021
References
http://www.openwall.com/lists/oss-security/2022/11/04/4(product-security@apple.com)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(product-security@apple.com)
https://security.gentoo.org/glsa/202305-32(product-security@apple.com)
https://support.apple.com/en-us/HT213488(product-security@apple.com)
https://support.apple.com/en-us/HT213489(product-security@apple.com)
https://support.apple.com/en-us/HT213491(product-security@apple.com)
https://support.apple.com/en-us/HT213492(product-security@apple.com)
https://support.apple.com/en-us/HT213495(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5273(product-security@apple.com)
https://www.debian.org/security/2022/dsa-5274(product-security@apple.com)
http://www.openwall.com/lists/oss-security/2022/11/04/4(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202305-32(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213488(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213489(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213491(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213492(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213495(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5273(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2022/dsa-5274(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.