Vulnerability Description
A type confusion issue was addressed with improved state handling. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to execute arbitrary code with kernel privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | 10.15.7 |
| Apple | Macos | >= 11.0, < 11.6.5 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/HT213183Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213184Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213185Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213183Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213184Release NotesVendor Advisory
- https://support.apple.com/en-us/HT213185Release NotesVendor Advisory
FAQ
What is CVE-2022-46706?
CVE-2022-46706 is a vulnerability with a CVSS score of 7.8 (HIGH). A type confusion issue was addressed with improved state handling. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to ex...
How severe is CVE-2022-46706?
CVE-2022-46706 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46706?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Apple Macos.