Search for vulnerabilities
Vulnerability details: VCID-a252-b57c-aaah
Vulnerability ID VCID-a252-b57c-aaah
Aliases CVE-2022-32893
Summary An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Status Published
Exploitability 2.0
Weighted Severity 7.9
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00101 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00141 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00145 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00145 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.00593 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.02752 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.02752 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.03098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
epss 0.03098 https://api.first.org/data/v1/epss?cve=CVE-2022-32893
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2121645
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2022/Aug/16
ssvc Attend http://seclists.org/fulldisclosure/2022/Aug/16
cvssv3.1 8.8 http://seclists.org/fulldisclosure/2022/Oct/49
ssvc Attend http://seclists.org/fulldisclosure/2022/Oct/49
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
cvssv3.1 8.8 https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
ssvc Attend https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
ssvc Attend https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
ssvc Attend https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
ssvc Attend https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
cvssv3.1 8.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
ssvc Attend https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-32893
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2022-32893
archlinux Unknown https://security.archlinux.org/AVG-2819
archlinux Unknown https://security.archlinux.org/AVG-2820
cvssv3.1 8.8 https://security.gentoo.org/glsa/202208-39
ssvc Attend https://security.gentoo.org/glsa/202208-39
cvssv3.1 8.8 https://support.apple.com/en-us/HT213412
cvssv3.1 8.8 https://support.apple.com/en-us/HT213412
ssvc Attend https://support.apple.com/en-us/HT213412
ssvc Attend https://support.apple.com/en-us/HT213412
cvssv3.1 8.8 https://support.apple.com/en-us/HT213413
cvssv3.1 8.8 https://support.apple.com/en-us/HT213413
ssvc Attend https://support.apple.com/en-us/HT213413
ssvc Attend https://support.apple.com/en-us/HT213413
cvssv3.1 8.8 https://support.apple.com/en-us/HT213414
cvssv3.1 8.8 https://support.apple.com/en-us/HT213414
ssvc Attend https://support.apple.com/en-us/HT213414
ssvc Attend https://support.apple.com/en-us/HT213414
cvssv3.1 8.8 https://www.debian.org/security/2022/dsa-5219
cvssv3.1 8.8 https://www.debian.org/security/2022/dsa-5219
ssvc Attend https://www.debian.org/security/2022/dsa-5219
ssvc Attend https://www.debian.org/security/2022/dsa-5219
cvssv3.1 8.8 https://www.debian.org/security/2022/dsa-5220
cvssv3.1 8.8 https://www.debian.org/security/2022/dsa-5220
ssvc Attend https://www.debian.org/security/2022/dsa-5220
ssvc Attend https://www.debian.org/security/2022/dsa-5220
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/25/5
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/25/5
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/25/5
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/25/5
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/26/2
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/26/2
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/26/2
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/26/2
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/29/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/29/1
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/29/1
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/29/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/29/2
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/08/29/2
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/29/2
ssvc Attend http://www.openwall.com/lists/oss-security/2022/08/29/2
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/09/02/10
ssvc Attend http://www.openwall.com/lists/oss-security/2022/09/02/10
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2022/09/13/1
ssvc Attend http://www.openwall.com/lists/oss-security/2022/09/13/1
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json
https://api.first.org/data/v1/epss?cve=CVE-2022-32893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893
http://seclists.org/fulldisclosure/2022/Aug/16
http://seclists.org/fulldisclosure/2022/Oct/49
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
https://security.gentoo.org/glsa/202208-39
https://support.apple.com/en-us/HT213412
https://support.apple.com/en-us/HT213413
https://support.apple.com/en-us/HT213414
https://www.debian.org/security/2022/dsa-5219
https://www.debian.org/security/2022/dsa-5220
http://www.openwall.com/lists/oss-security/2022/08/25/5
http://www.openwall.com/lists/oss-security/2022/08/26/2
http://www.openwall.com/lists/oss-security/2022/08/29/1
http://www.openwall.com/lists/oss-security/2022/08/29/2
http://www.openwall.com/lists/oss-security/2022/09/02/10
http://www.openwall.com/lists/oss-security/2022/09/13/1
2121645 https://bugzilla.redhat.com/show_bug.cgi?id=2121645
AVG-2819 https://security.archlinux.org/AVG-2819
AVG-2820 https://security.archlinux.org/AVG-2820
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-32893 https://nvd.nist.gov/vuln/detail/CVE-2022-32893
RHSA-2022:6540 https://access.redhat.com/errata/RHSA-2022:6540
RHSA-2022:6634 https://access.redhat.com/errata/RHSA-2022:6634
USN-5611-1 https://usn.ubuntu.com/5611-1/
Data source KEV
Date added Aug. 18, 2022
Description Apple iOS and macOS contain an out-of-bounds write vulnerability that could allow for remote code execution when processing malicious crafted web content.
Required action Apply updates per vendor instructions.
Due date Sept. 8, 2022
Note
https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413;  https://nvd.nist.gov/vuln/detail/CVE-2022-32893
Ransomware campaign use Unknown
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2022/Aug/16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://seclists.org/fulldisclosure/2022/Aug/16
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://seclists.org/fulldisclosure/2022/Oct/49
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://seclists.org/fulldisclosure/2022/Oct/49
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-32893
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-32893
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://security.gentoo.org/glsa/202208-39
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://security.gentoo.org/glsa/202208-39
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213412
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213412
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://support.apple.com/en-us/HT213412

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://support.apple.com/en-us/HT213412
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213413
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213413
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://support.apple.com/en-us/HT213413

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://support.apple.com/en-us/HT213413
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213414
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213414
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://support.apple.com/en-us/HT213414

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://support.apple.com/en-us/HT213414
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2022/dsa-5219
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2022/dsa-5219
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://www.debian.org/security/2022/dsa-5219

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://www.debian.org/security/2022/dsa-5219
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2022/dsa-5220
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2022/dsa-5220
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://www.debian.org/security/2022/dsa-5220

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at https://www.debian.org/security/2022/dsa-5220
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/25/5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/25/5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/25/5

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/25/5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/26/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/26/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/26/2

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/26/2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/29/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/29/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/29/1

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/29/1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/29/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/08/29/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/29/2

Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/08/29/2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/09/02/10
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/09/02/10
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2022/09/13/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/ Found at http://www.openwall.com/lists/oss-security/2022/09/13/1
Exploit Prediction Scoring System (EPSS)
Percentile 0.24616
EPSS Score 0.00098
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.