CVE-2022-32788
moderate-risk
Published 2022-09-20
A buffer overflow was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. A remote user may be able to cause kernel code execution.
Do I need to act?
-
0.89% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (8)
Release Notes
https://support.apple.com/en-us/HT213340
Release Notes
https://support.apple.com/en-us/HT213342
Release Notes
https://support.apple.com/en-us/HT213345
Release Notes
https://support.apple.com/en-us/HT213346
Release Notes
https://support.apple.com/en-us/HT213340
Release Notes
https://support.apple.com/en-us/HT213342
Release Notes
https://support.apple.com/en-us/HT213345
Release Notes
https://support.apple.com/en-us/HT213346
47
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
12/34 · Low