First published: Tue Dec 13 2022(Updated: )
Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication.
Credit: Apple Apple Apple Apple product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <16.2 | 16.2 |
Apple Multiple Products | ||
Fortinet FortiOS | ||
Apple watchOS | <9.2 | 9.2 |
Apple macOS Ventura | <13.1 | 13.1 |
Apple iOS | <16.2 | 16.2 |
Apple iPadOS | <16.2 | 16.2 |
<16.2 | ||
<16.2 | ||
>=13.0<13.1 | ||
<16.2 | ||
<9.2 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)