Vulnerability Description
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | >= 10.15, < 10.15.7 |
| Apple | Macos | >= 11.0, < 11.6.5 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/HT213183Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213184Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213185Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213183Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213184Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213185Release NotesVendor Advisory
FAQ
What is CVE-2022-22627?
CVE-2022-22627 is a vulnerability with a CVSS score of 7.1 (HIGH). An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted...
How severe is CVE-2022-22627?
CVE-2022-22627 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-22627?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Apple Macos.