First published: Wed Jul 20 2022(Updated: )
A buffer overflow was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. A remote user may be able to cause kernel code execution.
Credit: Natalie Silvanovich Google Project ZeroNatalie Silvanovich Google Project ZeroNatalie Silvanovich Google Project ZeroNatalie Silvanovich Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <8.7 | 8.7 |
Apple tvOS | <15.6 | 15.6 |
<12.5 | 12.5 | |
Apple iOS | <15.6 | 15.6 |
Apple iPadOS | <15.6 | 15.6 |
Apple iPadOS | <15.6 | |
Apple iPhone OS | <15.6 | |
Apple macOS | >=12.0.0<12.5 | |
Apple tvOS | <15.6 | |
Apple watchOS | <8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-32788 is a buffer overflow vulnerability in AppleAVD that has been addressed with improved bounds checking.
CVE-2022-32788 affects macOS Monterey (up to version 12.5), iOS (up to version 15.6), iPadOS (up to version 15.6), watchOS (up to version 8.7), and tvOS (up to version 15.6).
The severity of CVE-2022-32788 is not mentioned in the provided information, but it is a buffer overflow vulnerability which can potentially be exploited by attackers.
To fix CVE-2022-32788, ensure that you update your macOS Monterey, iOS, iPadOS, watchOS, and tvOS to the latest available versions provided by Apple.
You can find more information about CVE-2022-32788 on the Apple Support website. Here are some relevant links: [Link 1](https://support.apple.com/en-us/HT213345), [Link 2](https://support.apple.com/en-us/HT213340), [Link 3](https://support.apple.com/en-us/HT213342).