First published: Mon May 16 2022(Updated: )
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious application may be able to execute arbitrary code with system privileges.
Credit: product-security@apple.com Wang Yu CyberservalArsenii Kostromin (0x3c3e) MicrosoftJonathan Bar Or MicrosoftWojciech Reguła @_r3ggi SecuRingZhipeng Huo @R3dF09 Tencent Security Xuanwu LabYuebin Sun @yuebinsun2020 Tencent Security Xuanwu LabMax Shavrick @_mxms the Google Security TeamZubair Ashraf CrowdstrikeCVE-2022-0778 CVE-2022-23308 Paul Walker BuryNathaniel Ekoniak Ennate TechnologiesMickey Jin @patch1t @gorelics an anonymous researcher Linus Henze Pinauten GmbHPeter Nguyễn Vũ Hoàng STAR LabsFelix Poulin-Belanger Gergely Kalman @gergely_kalman Mandiant MandiantJoshua Mason MandiantAntonio Cheong Yu Xuan YCISCQArsenii Kostromin (0x3c3e) Ron Waisberg SecuRingan anonymous researcher SecuRing Perception PointRon Hass @ronhass7 Perception Pointryuzaki Chijin Zhou ShuiMuYuLin LtdTsinghua wingtecher lab Jeonghoon Shin TheoriSorryMybad @S0rryMybad Kunlun LabDongzhuo Zhao ADLab of VenustechScarlet Raine CVE-2022-0530 Tavis Ormandy CVE-2021-45444 ABC Research s.r.o CVE-2021-44224 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 Michael DePlante @izobashi Trend Micro Zero Day InitiativeQi Sun Trend MicroRobert Ai Trend MicroYe Zhang @co0py_Cat Baidu SecurityJon Thompson EvolveIA) Yonghwi Jin @jinmo123 Theoriactae0n Blacksun Hackers Club working with Trend Micro Zero Day InitiativeAndrew Williams GoogleAvi Drissman GoogleLiu Long Ant Security LightAntonio Zekic @antoniozekic Jeonghoon Shin Theori working with Trend Micro Zero Day InitiativeJack Dates RET2 Systems Incchenyuwang @mzzzz__ Tencent Security Xuanwu LabJordy Zomer @pwningsystems Peter Nguyễn Vũ Hoàng @peternguyen14 STAR LabsNed Williamson Google Project Zero
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.4 | 12.4 |
Apple iOS, iPadOS, and watchOS | <15.5 | |
iOS | <15.5 | |
Apple iOS and macOS | >=12.0.0<12.4 | |
Apple iOS, iPadOS, and watchOS | <15.5 | 15.5 |
Apple iOS, iPadOS, and watchOS | <15.5 | 15.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-26762 is a Wi-Fi vulnerability that involves a memory corruption issue addressed with improved memory handling.
CVE-2022-26762 affects macOS Monterey version up to and excluding 12.4, iOS version up to and excluding 15.5, and iPadOS version up to and excluding 15.5.
To fix CVE-2022-26762, update your macOS Monterey to version 12.4, update your iOS to version 15.5, or update your iPadOS to version 15.5.
The severity rating for CVE-2022-26762 has not been specified.
You can find more information about CVE-2022-26762 on Apple's official support page: [https://support.apple.com/en-us/HT213257](https://support.apple.com/en-us/HT213257)