Vulnerability Description
A certificate validation issue existed in the handling of WKWebView. This issue was addressed with improved validation. This issue is fixed in tvOS 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. Processing a maliciously crafted certificate may lead to arbitrary code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 16.0 |
| Apple | Iphone Os | < 16.1 |
| Apple | Macos | < 13.0 |
| Apple | Tvos | < 16.1 |
| Apple | Watchos | < 9.1 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/HT213488Vendor Advisory
- https://support.apple.com/en-us/HT213489Vendor Advisory
- https://support.apple.com/en-us/HT213491Vendor Advisory
- https://support.apple.com/en-us/HT213492Vendor Advisory
- https://support.apple.com/en-us/HT213488Vendor Advisory
- https://support.apple.com/en-us/HT213489Vendor Advisory
- https://support.apple.com/en-us/HT213491Vendor Advisory
- https://support.apple.com/en-us/HT213492Vendor Advisory
FAQ
What is CVE-2022-42813?
CVE-2022-42813 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A certificate validation issue existed in the handling of WKWebView. This issue was addressed with improved validation. This issue is fixed in tvOS 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13, watc...
How severe is CVE-2022-42813?
CVE-2022-42813 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-42813?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos, Apple Tvos, Apple Watchos.