CVE-2022-26766

MEDIUM

tvOS <15.5-iOS <15.5- iPadOS <15.5 - Signature Validation Bypass

Title source: llm
STIX 2.1

Description

A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.

Exploits (1)

nomisec WORKING POC 88 stars
by zhuowei · poc
https://github.com/zhuowei/CoreTrustDemo

References (6)

Core 6
Core References
Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT213255
Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT213256
Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT213258
Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT213253
Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT213254
Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT213257

Scores

CVSS v3 5.5
EPSS 0.0196
EPSS Percentile 83.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-295
Status published
Products (7)
apple/ipados < 15.5
apple/iphone_os < 15.5
apple/mac_os_x 10.15.7 (13 CPE variants)
apple/mac_os_x < 10.15.7
apple/macos 11.0 - 11.6.6
apple/tvos < 15.5
apple/watchos < 8.6
Published May 26, 2022
Tracked Since Feb 18, 2026