CVE-2022-26757
high-risk
Published 2022-05-26
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges.
Do I need to act?
~
6.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (19)
Affected Vendors
References (14)
Third Party Advisory
http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-A...
Vendor Advisory
https://support.apple.com/en-us/HT213253
Vendor Advisory
https://support.apple.com/en-us/HT213254
Vendor Advisory
https://support.apple.com/en-us/HT213255
Vendor Advisory
https://support.apple.com/en-us/HT213256
Vendor Advisory
https://support.apple.com/en-us/HT213257
Vendor Advisory
https://support.apple.com/en-us/HT213258
Third Party Advisory
http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-A...
Vendor Advisory
https://support.apple.com/en-us/HT213253
Vendor Advisory
https://support.apple.com/en-us/HT213254
Vendor Advisory
https://support.apple.com/en-us/HT213255
Vendor Advisory
https://support.apple.com/en-us/HT213256
Vendor Advisory
https://support.apple.com/en-us/HT213257
Vendor Advisory
https://support.apple.com/en-us/HT213258
52
/ 100
high-risk
Severity
24/34 · High
Exploitability
9/34 · Low
Exposure
19/34 · Moderate