First published: Tue Dec 13 2022(Updated: )
TCC. A logic issue was addressed with improved restrictions.
Credit: Michael (Biscuit) Thomas product-security@apple.com Michael (Biscuit) Thomas Michael (Biscuit) Thomas Michael (Biscuit) Thomas Michael (Biscuit) Thomas product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Big Sur | <11.7.2 | 11.7.2 |
Apple iPadOS | <15.7.2 | |
Apple iPhone OS | <15.7.2 | |
Apple macOS | >=11.0.0<11.7.2 | |
Apple macOS | >=12.0.0<12.6.2 | |
Apple macOS | >=13.0<13.1 | |
<13.1 | 13.1 | |
<12.6.2 | 12.6.2 | |
Apple iOS | <16.2 | 16.2 |
Apple iPadOS | <16.2 | 16.2 |
Apple iOS | <15.7.2 | 15.7.2 |
Apple iPadOS | <15.7.2 | 15.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-46718 is a logic issue in TCC that has been addressed with improved restrictions.
CVE-2022-46718 affects Apple iOS (up to version 16.2), Apple iPadOS (up to version 16.2), Apple iOS (up to version 15.7.2), Apple iPadOS (up to version 15.7.2), Apple macOS Ventura (up to version 13.1), Apple macOS Big Sur (up to version 11.7.2), and Apple macOS Monterey (up to version 12.6.2).
The severity of CVE-2022-46718 is not specified.
To fix CVE-2022-46718, update your software to the latest versions provided by Apple.
You can find more information about CVE-2022-46718 on the Apple support website: [https://support.apple.com/en-us/HT213530](https://support.apple.com/en-us/HT213530), [https://support.apple.com/en-us/HT213532](https://support.apple.com/en-us/HT213532), [https://support.apple.com/en-us/HT213531](https://support.apple.com/en-us/HT213531)