First published: Tue Dec 13 2022(Updated: )
The issue was addressed with improved handling of caches. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, watchOS 9.2. An app may be able to read sensitive location information.
Credit: an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.2 | |
Apple iPhone OS | <16.2 | |
Apple macOS | <13.1 | |
Apple tvOS | <16.2 | |
Apple watchOS | <9.2 | |
Apple tvOS | <16.2 | 16.2 |
<13.1 | 13.1 | |
<9.2 | 9.2 | |
Apple iOS | <16.2 | 16.2 |
Apple iPadOS | <16.2 | 16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2022-42866.
The affected software includes Apple iOS up to version 16.2, Apple iPadOS up to version 16.2, Apple macOS Ventura up to version 13.1, Apple watchOS up to version 9.2, and Apple tvOS up to version 16.2.
The vulnerability was addressed with improved handling of caches.
You can find more information about this vulnerability on the Apple support website. Here are some references: [link1](https://support.apple.com/en-us/HT213530), [link2](https://support.apple.com/en-us/HT213532), [link3](https://support.apple.com/en-us/HT213536).