SB2022102441 - Multiple vulnerabilities in Apple watchOS
Published: October 24, 2022 Updated: September 18, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 21 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42825)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions within the AppleMobileFileIntegrity. A local application can modify protected parts of the filesystem.
2) Buffer overflow (CVE-ID: CVE-2022-32940)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within AVEVideoEncoder. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
3) Improper Certificate Validation (CVE-ID: CVE-2022-42813)
The vulnerability allows a remote attacker to perform MitM attacks.
The vulnerability exists due to improper certificate validation when handling WKWebView in CFNetwork. A remote attacker can forge a digital certificate, perform MitM attack and compromise the affected system.
4) Buffer overflow (CVE-ID: CVE-2022-32947)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within GPU Drivers. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
5) Buffer overflow (CVE-ID: CVE-2022-32924)
The vulnerability allows a local application to escalate privileges on the system.
The
vulnerability exists due to a boundary error in OS kernel. A local
application can trigger memory corruption and execute arbitrary code with kernel privileges.
6) Out-of-bounds write (CVE-ID: CVE-2022-42808)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A remote application can trigger an out-of-bounds write and execute arbitrary code with kernel privileges.
7) Security features bypass (CVE-ID: CVE-2022-42811)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to improperly imposed security restrictions in Sandbox. A local application can gain unauthorized access to user information.
8) Spoofing attack (CVE-ID: CVE-2022-42799)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in WebKit. A remote attacker can trick the victim to visit a specially crafted website and spoof user interface.
9) Type Confusion (CVE-ID: CVE-2022-42823)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error when processing HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted website, trigger a type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
10) Information disclosure (CVE-ID: CVE-2022-42824)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error in WebKit. A remote attacker can trick the victim to visit a specially crafted web page and gain access to potentially sensitive information.
11) Information disclosure (CVE-ID: CVE-2022-32923)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists in WebKit due to an error in the JIT implementation. A remote attacker can trick the victim to visit a malicious website and disclose internal states of the application.
12) Buffer overflow (CVE-ID: CVE-2022-32926)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
13) Buffer overflow (CVE-ID: CVE-2022-32932)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Apple Neural Engine. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
14) Buffer overflow (CVE-ID: CVE-2022-32944)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.
15) Heap-based buffer overflow (CVE-ID: CVE-2022-37434)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a large gzip header within inflateGetHeader in inflate.c. A remote attacker can pass a specially crafted file to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
16) Out-of-bounds read (CVE-ID: CVE-2022-42798)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition when parsing media files in the Audio subsystem. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and gain access to sensitive information.
17) Heap-based buffer overflow (CVE-ID: CVE-2022-42800)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing gzip files. A remote attacker can pass a specially crafted file to the affected application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
18) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-42801)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions within the OS kernel. A local application can execute arbitrary code with kernel privileges.
19) Race condition (CVE-ID: CVE-2022-42803)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition within the OS kernel. A local application can exploit the race and escalate privileges on the system.
20) Information disclosure (CVE-ID: CVE-2022-42817)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Safari. A remote attacker trick the victim into visiting a malicious website and gain access to sensitive information.
21) Use-after-free (CVE-ID: CVE-2022-46712)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the OS kernel subsystem. A local application can trigger a use-after-free error and execute arbitrary code with kernel privileges.
Remediation
Install update from vendor's website.