CNVD-2022-71998

Vulnerability from cnvd - Published: 2022-10-27
VLAI Severity ?
Title
Apple iOS and iPadOS输入验证错误漏洞
Description
Apple iOS和Apple iPadOS都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。 Apple iOS 15.6之前版本和iPadOS 15.6之前版本存在输入验证错误漏洞,该漏洞源于WebKit 中对用户提供的数据处理不正确,攻击者可利用该漏洞可以使用户访问包含恶意内容的网站可能会导致UI欺骗。
Severity
Patch Name
Apple iOS and iPadOS输入验证错误漏洞的补丁
Patch Description
Apple iOS和Apple iPadOS都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。 Apple iOS 15.6之前版本和iPadOS 15.6之前版本存在输入验证错误漏洞,该漏洞源于WebKit 中对用户提供的数据处理不正确,攻击者可利用该漏洞可以使用户访问包含恶意内容的网站可能会导致UI欺骗。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://support.apple.com/en-us/HT213346

Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-32816
Impacted products
Name
['Apple iOS <15.6', 'Apple iPadOS <15.6', 'Apple tvOS <15.6', 'Apple watchOS <8.7', 'Apple MacOS >=12.0,<12.5']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-32816",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
    }
  },
  "description": "Apple iOS\u548cApple iPadOS\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e00\u5957\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Apple iPadOS\u662f\u4e00\u5957\u7528\u4e8eiPad\u5e73\u677f\u7535\u8111\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nApple iOS 15.6\u4e4b\u524d\u7248\u672c\u548ciPadOS 15.6\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWebKit \u4e2d\u5bf9\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u5904\u7406\u4e0d\u6b63\u786e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u4ee5\u4f7f\u7528\u6237\u8bbf\u95ee\u5305\u542b\u6076\u610f\u5185\u5bb9\u7684\u7f51\u7ad9\u53ef\u80fd\u4f1a\u5bfc\u81f4UI\u6b3a\u9a97\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.apple.com/en-us/HT213346",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-71998",
  "openTime": "2022-10-27",
  "patchDescription": "Apple iOS\u548cApple iPadOS\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e00\u5957\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Apple iPadOS\u662f\u4e00\u5957\u7528\u4e8eiPad\u5e73\u677f\u7535\u8111\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nApple iOS 15.6\u4e4b\u524d\u7248\u672c\u548ciPadOS 15.6\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWebKit \u4e2d\u5bf9\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u5904\u7406\u4e0d\u6b63\u786e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u4ee5\u4f7f\u7528\u6237\u8bbf\u95ee\u5305\u542b\u6076\u610f\u5185\u5bb9\u7684\u7f51\u7ad9\u53ef\u80fd\u4f1a\u5bfc\u81f4UI\u6b3a\u9a97\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apple iOS and iPadOS\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apple iOS \u003c15.6",
      "Apple iPadOS \u003c15.6",
      "Apple tvOS \u003c15.6",
      "Apple watchOS \u003c8.7",
      "Apple MacOS \u003e=12.0\uff0c\u003c12.5"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
  "serverity": "\u9ad8",
  "submitTime": "2022-07-22",
  "title": "Apple iOS and iPadOS\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…