The version of Apple iOS running on the mobile device is prior to 16. It is, therefore, affected by multiple vulnerabilities:
Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32886)
An app may be able to disclose kernel memory (CVE-2022-32864)
An app may be able to execute arbitrary code with kernel privilege (CVE-2022-32911)
An application may be able to execute arbitrary code with kernel privileges (CVE-2022-32917)
A user may be able to elevate privileges (CVE-2022-32908)
Visiting a malicious website may lead to address bar spoofing (CVE-2022-32795)
An app may be able to bypass Privacy preferences (CVE-2022-32854)
Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32912)
A website may be able to track users through Safari web extensions (CVE-2022-32868)
A person with physical access to an iOS device may be able to access photos from the lock screen (CVE-2022-32872)
An app may be able to read sensitive location information (CVE-2022-32883)
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
Binary data apple_ios_16_check.nbin
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32859
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32883
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32892
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32908
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32911
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32913
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32917
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32918
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46709
support.apple.com/en-ie/HT213446