First published: Wed Nov 30 2022(Updated: )
A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1..
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.1.2 | 16.1.2 |
Apple iOS | <16.2 | 16.2 |
Apple iPadOS | <16.2 | 16.2 |
Apple iOS | <15.7.2 | 15.7.2 |
Apple iPadOS | <15.7.2 | 15.7.2 |
<13.1 | 13.1 | |
Apple tvOS | <16.2 | 16.2 |
Apple Safari | <16.2 | 16.2 |
Apple iOS | ||
Apple Safari | <16.2 | |
Apple iPadOS | <15.7.2 | |
Apple iPhone OS | <15.7.2 | |
Apple iPhone OS | >=16.0<16.1.2 | |
Apple macOS | <13.1 | |
Apple tvOS | <16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2022-42856 is a type confusion vulnerability in Apple iOS that allows for code execution when processing malicious web content.
CVE-2022-42856 affects Apple iOS, Apple iPadOS, Apple macOS Ventura, Apple tvOS, and Apple Safari.
CVE-2022-42856 affects Apple iOS versions up to and excluding 16.2, 16.1.2, and 15.7.2.
To fix CVE-2022-42856, update your Apple iOS to version 16.2 or newer.
You can find more information about CVE-2022-42856 on Apple's support page: [insert link]