First published: Mon Oct 24 2022(Updated: )
A certificate validation issue existed in the handling of WKWebView. This issue was addressed with improved validation. This issue is fixed in tvOS 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. Processing a maliciously crafted certificate may lead to arbitrary code execution.
Credit: Jonathan Zhang Open Computing FacilityJonathan Zhang Open Computing FacilityJonathan Zhang Open Computing FacilityJonathan Zhang Open Computing Facility product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
<13 | 13 | |
Apple iOS | <16.1 | 16.1 |
Apple iPadOS | <16 | 16 |
Apple watchOS | <9.1 | 9.1 |
Apple tvOS | <16.1 | 16.1 |
Apple iPadOS | <16.0 | |
Apple iPhone OS | <16.1 | |
Apple macOS | <13.0 | |
Apple tvOS | <16.1 | |
Apple watchOS | <9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-42813 is a certificate validation issue that existed in the handling of WKWebView in CFNetwork.
The affected software versions include Apple iOS up to version 16.1, Apple iPadOS up to version 16, Apple tvOS up to version 16.1, Apple watchOS up to version 9.1, and Apple macOS Ventura up to version 13.
To fix CVE-2022-42813, update your Apple device to the latest version of the software available.
You can find more information about CVE-2022-42813 on the official Apple support website at the following links: [Link 1](https://support.apple.com/en-us/HT213489), [Link 2](https://support.apple.com/en-us/HT213491), [Link 3](https://support.apple.com/en-us/HT213492).