7
CVSSv3

CVE-2022-42864

Published: 15/12/2022 Updated: 09/01/2023
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple macos 13.0

apple watchos

apple ipados

apple iphone os

apple tvos

apple macos

Github Repositories

Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition

CVE-2022-42864: Diabolical Cookies What is this repo? This is my (incomplete) proof-of-concept exploit for CVE-2022-42864, a time-of-check-time-of-use vulnerability in IOHIDFamily that was fixed in iOS 162 / macOS Ventura 131 What is the status of the proof-of-concept? The exploit currently achieves the same "arbitrary kfree" primitive used in the multicast_bytecop