CVE-2022-32813
moderate-risk
Published 2022-08-24
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6, tvOS 15.6, watchOS 8.7. An app with root privileges may be able to execute arbitrary code with kernel privileges.
Do I need to act?
-
0.15% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (19)
Affected Vendors
References (12)
Vendor Advisory
https://support.apple.com/en-us/HT213340
Vendor Advisory
https://support.apple.com/en-us/HT213342
Vendor Advisory
https://support.apple.com/en-us/HT213343
Vendor Advisory
https://support.apple.com/en-us/HT213344
Vendor Advisory
https://support.apple.com/en-us/HT213345
Vendor Advisory
https://support.apple.com/en-us/HT213346
Vendor Advisory
https://support.apple.com/en-us/HT213340
Vendor Advisory
https://support.apple.com/en-us/HT213342
Vendor Advisory
https://support.apple.com/en-us/HT213343
Vendor Advisory
https://support.apple.com/en-us/HT213344
Vendor Advisory
https://support.apple.com/en-us/HT213345
Vendor Advisory
https://support.apple.com/en-us/HT213346
44
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
19/34 · Moderate