CVE-2022-32857

Severity
4.3MEDIUM
EPSS
0.1%
top 76.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 24
Latest updateAug 25

Description

This issue was addressed by using HTTPS when sending information over the network. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6, tvOS 15.6, watchOS 8.7. A user in a privileged network position can track a user’s activity.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages9 packages

CVEListV5apple/macosunspecified12.5+2
NVDapple/macos11.011.6.8+3
NVDapple/mac_os_x10.15.7
CVEListV5apple/tvosunspecified15.6
NVDapple/tvos< 15.6

🔴Vulnerability Details

2
GHSA
GHSA-jx6j-76gr-qfqf: This issue was addressed by using HTTPS when sending information over the network2022-08-25
CVEList
CVE-2022-32857: This issue was addressed by using HTTPS when sending information over the network2022-08-24

📋Vendor Advisories

6
Apple
CVE-2022-32857: macOS Big Sur 11.6.82022-07-20
Apple
CVE-2022-32857: iOS 15.6 and iPadOS 15.62022-07-20
Apple
CVE-2022-32857: watchOS 8.72022-07-20
Apple
CVE-2022-32857: Security Update 2022-005 Catalina2022-07-20
Apple
CVE-2022-32857: macOS Monterey 12.52022-07-20
CVE-2022-32857 (MEDIUM CVSS 4.3) | This issue was addressed by using H | cvebase.io