ID

VAR-202302-1860


CVE

CVE-2022-46713


TITLE

apple's  macOS  Race condition vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2022-020468

DESCRIPTION

A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to modify protected parts of the file system

Trust: 1.8

sources: NVD: CVE-2022-46713 // JVNDB: JVNDB-2022-020468 // VULHUB: VHN-447287 // VULMON: CVE-2022-46713

AFFECTED PRODUCTS

vendor:applemodel:macosscope:ltversion:12.6.1

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.7.1

Trust: 1.0

vendor:アップルmodel:macosscope:eqversion:11.0 that's all 11.7.1

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion: -

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:12.0.0 that's all 12.6.1

Trust: 0.8

sources: JVNDB: JVNDB-2022-020468 // NVD: CVE-2022-46713

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-46713
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-46713
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202302-2151
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-46713
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.0
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-46713
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-020468 // CNNVD: CNNVD-202302-2151 // NVD: CVE-2022-46713

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:Race condition (CWE-362) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-447287 // JVNDB: JVNDB-2022-020468 // NVD: CVE-2022-46713

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-2151

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-202302-2151

PATCH

title:HT213493 Apple  Security updateurl:https://support.apple.com/en-us/HT213488

Trust: 0.8

title:Apple macOS Repair measures for the competition condition problem loopholeurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=228166

Trust: 0.6

sources: JVNDB: JVNDB-2022-020468 // CNNVD: CNNVD-202302-2151

EXTERNAL IDS

db:NVDid:CVE-2022-46713

Trust: 3.4

db:JVNDBid:JVNDB-2022-020468

Trust: 0.8

db:CNNVDid:CNNVD-202302-2151

Trust: 0.6

db:VULHUBid:VHN-447287

Trust: 0.1

db:VULMONid:CVE-2022-46713

Trust: 0.1

sources: VULHUB: VHN-447287 // VULMON: CVE-2022-46713 // JVNDB: JVNDB-2022-020468 // CNNVD: CNNVD-202302-2151 // NVD: CVE-2022-46713

REFERENCES

url:https://support.apple.com/en-us/ht213488

Trust: 1.8

url:https://support.apple.com/en-us/ht213493

Trust: 1.8

url:https://support.apple.com/en-us/ht213494

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-46713

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-46713/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-447287 // VULMON: CVE-2022-46713 // JVNDB: JVNDB-2022-020468 // CNNVD: CNNVD-202302-2151 // NVD: CVE-2022-46713

SOURCES

db:VULHUBid:VHN-447287
db:VULMONid:CVE-2022-46713
db:JVNDBid:JVNDB-2022-020468
db:CNNVDid:CNNVD-202302-2151
db:NVDid:CVE-2022-46713

LAST UPDATE DATE

2024-08-14T15:16:10.630000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-447287date:2023-03-08T00:00:00
db:VULMONid:CVE-2022-46713date:2023-02-27T00:00:00
db:JVNDBid:JVNDB-2022-020468date:2023-11-02T02:30:00
db:CNNVDid:CNNVD-202302-2151date:2023-03-09T00:00:00
db:NVDid:CVE-2022-46713date:2023-03-08T18:14:42.143

SOURCES RELEASE DATE

db:VULHUBid:VHN-447287date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-46713date:2023-02-27T00:00:00
db:JVNDBid:JVNDB-2022-020468date:2023-11-02T00:00:00
db:CNNVDid:CNNVD-202302-2151date:2023-02-27T00:00:00
db:NVDid:CVE-2022-46713date:2023-02-27T20:15:12.950