First published: Mon Oct 24 2022(Updated: )
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
<13 | 13 | |
Apple iOS | <16.1 | 16.1 |
Apple iPadOS | <16 | 16 |
Apple watchOS | <9.1 | 9.1 |
Apple tvOS | <16.1 | 16.1 |
Apple Safari | <16.1 | 16.1 |
Apple Safari | <16.1 | |
Apple iPadOS | <16.0 | |
Apple iPhone OS | <16.1 | |
Apple macOS | <13.0 | |
Apple tvOS | <16.1 | |
Apple watchOS | <9.1 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/webkit2gtk | <=2.36.4-1~deb10u1 | 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2022-42799.
The affected software includes Apple iOS up to version 16.1, Apple iPadOS up to version 16, Apple watchOS up to version 9.1, Apple Safari up to version 16.1, Apple tvOS up to version 16.1, and macOS Ventura up to version 13.
The vulnerability was addressed with improved UI handling.
You can find more information about this vulnerability on the Apple support website at the following links: [link1](https://support.apple.com/en-us/HT213489), [link2](https://support.apple.com/en-us/HT213491), [link3](https://support.apple.com/en-us/HT213495).
To fix this vulnerability, update your software to the latest version provided by Apple.