First published: Mon Oct 24 2022(Updated: )
Model I/O. The issue was addressed with improved memory handling.
Credit: Xingwei Lin @xwlin_roy Yinyi Wu Ant Security Light product-security@apple.com Xingwei Lin @xwlin_roy Ant Security LightYinyi Wu Ant Security LightXingwei Lin @xwlin_roy Ant Security LightYinyi Wu Ant Security LightXingwei Lin @xwlin_roy Ant Security LightYinyi Wu Ant Security Light
Affected Software | Affected Version | How to fix |
---|---|---|
<13 | 13 | |
Apple iOS | <16.1 | 16.1 |
Apple iPadOS | <16 | 16 |
Apple iOS | <15.7.1 | 15.7.1 |
Apple iPadOS | <15.7.1 | 15.7.1 |
Apple tvOS | <16.1 | 16.1 |
Apple iPadOS | <15.7.1 | |
Apple iPhone OS | <15.7.1 | |
Apple iPhone OS | =16.0 | |
Apple macOS | <13.0 | |
Apple tvOS | <16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-42810 is a vulnerability in Model I/O that was addressed with improved memory handling.
The following software versions are affected by CVE-2022-42810: Apple iOS versions up to and exclusive of 16.1, Apple iPadOS versions up to and exclusive of 16, Apple iOS versions up to and exclusive of 15.7.1, Apple iPadOS versions up to and exclusive of 15.7.1, and macOS Ventura versions up to and exclusive of 13.
CVE-2022-42810 was addressed with improved memory handling.
To fix CVE-2022-42810, ensure that you update your software to the appropriate versions: Apple iOS version 16.1, Apple iPadOS version 16, Apple iOS version 15.7.1, Apple iPadOS version 15.7.1, or macOS Ventura version 13.
You can find more information about CVE-2022-42810 on the following references: [Apple Support - HT213489](https://support.apple.com/en-us/HT213489), [Apple Support - HT213490](https://support.apple.com/en-us/HT213490), [Apple Support - HT213492](https://support.apple.com/en-us/HT213492).