CVE-2022-22589

A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*

History

06 Oct 2022, 19:09

Type Values Removed Values Added
First Time Apple mac Os X
References (CONFIRM) https://support.apple.com/kb/HT213185 - (CONFIRM) https://support.apple.com/kb/HT213185 - Vendor Advisory
References (GENTOO) https://security.gentoo.org/glsa/202208-39 - (GENTOO) https://security.gentoo.org/glsa/202208-39 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/May/35 - (FULLDISC) http://seclists.org/fulldisclosure/2022/May/35 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/May/33 - (FULLDISC) http://seclists.org/fulldisclosure/2022/May/33 - Mailing List, Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213256 - (CONFIRM) https://support.apple.com/kb/HT213256 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT213255 - (CONFIRM) https://support.apple.com/kb/HT213255 - Vendor Advisory
CPE cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*

01 Sep 2022, 03:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-39 -

26 May 2022, 06:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213185 -

17 May 2022, 07:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/May/33 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/May/35 -

16 May 2022, 20:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213256 -
  • (CONFIRM) https://support.apple.com/kb/HT213255 -

28 Mar 2022, 17:00

Type Values Removed Values Added
References (MISC) https://support.apple.com/en-us/HT213057 - (MISC) https://support.apple.com/en-us/HT213057 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213054 - (MISC) https://support.apple.com/en-us/HT213054 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213053 - (MISC) https://support.apple.com/en-us/HT213053 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213059 - (MISC) https://support.apple.com/en-us/HT213059 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213058 - (MISC) https://support.apple.com/en-us/HT213058 - Vendor Advisory
CWE CWE-20
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
First Time Apple watchos
Apple ipados
Apple macos
Apple tvos
Apple
Apple iphone Os
Apple safari
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1

18 Mar 2022, 19:12

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-18 18:15

Updated : 2022-10-06 19:09


NVD link : CVE-2022-22589

Mitre link : CVE-2022-22589


JSON object : View

Products Affected

apple

  • macos
  • mac_os_x
  • watchos
  • safari
  • iphone_os
  • ipados
  • tvos
CWE
CWE-20

Improper Input Validation