Exploited
7.8
CWE
787 362 416
Advisory Published
CVE Published
CVE Published
Updated

CVE-2022-42827: Apple iOS and iPadOS Out-of-Bounds Write Vulnerability

First published: Mon Oct 24 2022(Updated: )

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..

Credit: Csaba Fitzl @theevilbit Offensive SecurityJonathan Zhang Open Computing FacilityGuilherme Rambo Best Buddy AppsBistrit Dahal Asahi Lina @LinaAsahi Willy R. Vasquez The University of Texas at AustinPeter Pan ZhenPeng STAR LabsTingting Yin Tsinghua UniversityTommy Muir @Muirey03 Tim Michaud @TimGMichaud MoveworksXinru Chi Pangu LabJohn Aakerblom @jaakerblom Ian Beer Google Project ZeroZweig Kunlun Laban anonymous researcher Xingwei Lin @xwlin_roy Ant Security LightYinyi Wu Ant Security LightIES Red Team ByteDanceMir Masood Ali Illinois at ChicagoPhD student Illinois at ChicagoUniversity Illinois at ChicagoMS student Illinois at ChicagoStony Brook University; Mohammad Ghasemisharif Illinois at ChicagoPhD Candidate Illinois at ChicagoAssociate Professor Illinois at ChicagoStony Brook University; Jason Polakis Illinois at ChicagoJustin Bui @slyd0g SnowflakeCristian Dinca Tudor Vianu National High School of Computer Science ofFrancisco Alonso @revskills Jihwan Kim @gPayl0ad Dohyun Lee @l33d0hyun Dohyun Lee @l33d0hyun SSD LabsAbdulrahman Alqabandi Microsoft Browser Vulnerability ResearchRyan Shin IAAI SecLab at Korea UniversityDohyun Lee @l33d0hyun DNSLab at Korea UniversityYonghwi Jin at Theori @jinmo123 Trend Micro Zero Day InitiativeWonyoung Jung @nonetype_pwn KAIST Hacking LabDr Hideaki Goto Tohoku UniversityJapan Evgeny Legerov Mickey Jin @patch1t Anonymous Trend Micro Zero Day InitiativeABC Research s.r.o. Mohamed Ghannam @_simo36 product-security@apple.com

Affected SoftwareAffected VersionHow to fix
Apple iOS and iPadOS
Apple iOS, iPadOS, and watchOS<16.1
16.1
Apple iOS, iPadOS, and watchOS<16
16
Apple iOS, iPadOS, and watchOS<15.7.1
15.7.1
Apple iOS, iPadOS, and watchOS<15.7.1
15.7.1
Apple iOS, iPadOS, and watchOS<15.7.1
iStyle @cosme iPhone OS<15.7.1
iStyle @cosme iPhone OS>=16.0<16.1
iStyle @cosme iPhone OS=16.0
Apple iOS and macOS<12.6.1
tvOS<16.1
Apple iOS, iPadOS, and watchOS<9.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-42827?

    CVE-2022-42827 is an out-of-bounds write vulnerability in Apple iOS and iPadOS kernel.

  • What can an application do with CVE-2022-42827?

    An application can perform code execution with kernel privileges using CVE-2022-42827.

  • Which software versions are affected by CVE-2022-42827?

    Apple iOS versions up to, but not including, 16.1 and Apple iPadOS versions up to, but not including, 16 are affected by CVE-2022-42827.

  • How can I fix CVE-2022-42827?

    Update your Apple iOS to version 16.1 or later, or update your Apple iPadOS to version 16 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203