First published: Thu Feb 10 2022(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
Credit: an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <15.3 | 15.3 |
Apple macOS Monterey | <12.2.1 | 12.2.1 |
Apple iOS | <15.3.1 | 15.3.1 |
Apple iPadOS | <15.3.1 | 15.3.1 |
Apple Safari | <15.3 | |
Apple iPadOS | <15.3.1 | |
Apple iPhone OS | <15.3.1 | |
Apple macOS | >=12.0.0<12.2.1 | |
Apple iOS, iPadOS, and macOS | ||
<15.3 | ||
<15.3.1 | ||
<15.3.1 | ||
>=12.0.0<12.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22620 is a remote code execution vulnerability in Apple Webkit that affects iOS, iPadOS, and macOS.
CVE-2022-22620 affects Apple Webkit, iOS, iPadOS, macOS Monterey, and Safari.
The severity of CVE-2022-22620 is not mentioned in the provided information.
To fix CVE-2022-22620, it is recommended to update to the latest version of Apple Webkit, iOS, iPadOS, macOS Monterey, and Safari.
More information about CVE-2022-22620 can be found in the references provided: [Reference 1](https://support.apple.com/en-us/HT213093), [Reference 2](https://support.apple.com/en-us/HT213092), [Reference 3](https://support.apple.com/en-us/HT213091).