First published: Mon May 16 2022(Updated: )
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
Credit: Linus Henze Pinauten GmbHLinus Henze Pinauten GmbHLinus Henze Pinauten GmbHLinus Henze Pinauten GmbHLinus Henze Pinauten GmbHLinus Henze Pinauten GmbH product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <8.6 | 8.6 |
Apple tvOS | <15.5 | 15.5 |
Apple Catalina | ||
Apple macOS Big Sur | <11.6.6 | 11.6.6 |
<12.4 | 12.4 | |
Apple iOS | <15.5 | 15.5 |
Apple iPadOS | <15.5 | 15.5 |
Apple iPadOS | <15.5 | |
Apple iPhone OS | <15.5 | |
Apple Mac OS X | <10.15.7 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-004 | |
Apple Mac OS X | =10.15.7-security_update_2021-005 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-security_update_2021-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-008 | |
Apple Mac OS X | =10.15.7-security_update_2022-001 | |
Apple Mac OS X | =10.15.7-security_update_2022-002 | |
Apple Mac OS X | =10.15.7-security_update_2022-003 | |
Apple macOS | >=11.0<11.6.6 | |
Apple macOS | >=12.0<12.4 | |
Apple tvOS | <15.5 | |
Apple watchOS | <8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2022-26766 is a certificate parsing issue that was addressed with improved checks.
CVE-2022-26766 affects Apple watchOS 8.6, Apple tvOS 15.5, Apple macOS Big Sur 11.6.6, Apple iOS 15.5, Apple iPadOS 15.5, and Apple macOS Monterey 12.4.
To fix CVE-2022-26766, update your software to the specified versions: Apple watchOS 8.6, Apple tvOS 15.5, Apple macOS Big Sur 11.6.6, Apple iOS 15.5, Apple iPadOS 15.5, or Apple macOS Monterey 12.4.
You can find more information about CVE-2022-26766 at the following references: [Link 1](https://support.apple.com/en-us/HT213254), [Link 2](https://support.apple.com/en-us/HT213257), [Link 3](https://support.apple.com/en-us/HT213255).