{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T19:23:17.396","vulnerabilities":[{"cve":{"id":"CVE-2022-22587","sourceIdentifier":"product-security@apple.com","published":"2022-03-18T18:15:12.480","lastModified":"2025-10-23T14:54:24.753","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, macOS Big Sur 11.6.3, macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.."},{"lang":"es","value":"Se abordó un problema de corrupción de memoria con una comprobación de entradas mejorada. Este problema es corregido en iOS versión 15.3 y iPadOS versión 15.3, macOS Big Sur versión 11.6.3, macOS Monterey versión 12.2. Una aplicación maliciosa puede ser capaz de ejecutar código arbitrario con privilegios del kernel. Apple está al tanto de un informe de que este problema puede haber sido explotado activamente"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:C\/I:C\/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"cisaExploitAdd":"2022-01-28","cisaActionDue":"2022-02-11","cisaRequiredAction":"Apply updates per vendor instructions.","cisaVulnerabilityName":"Apple Memory Corruption Vulnerability","weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.3","matchCriteriaId":"AB2F6E42-576E-41AE-AA8A-606A3FF1A649"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.3","matchCriteriaId":"D6465081-3081-4B3E-8DAD-A0E671DEF329"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"11.6.3","matchCriteriaId":"6846D174-7E4E-4ADC-BEEB-71BD3C15EBFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.2","matchCriteriaId":"F8DD9232-638D-4A8C-8D11-02F4059A06F6"}]}]}],"references":[{"url":"https:\/\/support.apple.com\/en-us\/HT213053","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/en-us\/HT213054","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/en-us\/HT213055","source":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/en-us\/HT213053","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/en-us\/HT213054","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https:\/\/support.apple.com\/en-us\/HT213055","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]},{"url":"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22587","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Third Party Advisory","US Government Resource"]}]}}]}