6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6 Medium
AI Score
Confidence
High
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.002 Low
EPSS
Percentile
52.3%
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
www.openwall.com/lists/oss-security/2022/11/04/4
lists.debian.org/debian-lts-announce/2022/11/msg00010.html
lists.fedoraproject.org/archives/list/[email protected]/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
lists.fedoraproject.org/archives/list/[email protected]/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
lists.fedoraproject.org/archives/list/[email protected]/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
security.gentoo.org/glsa/202305-32
support.apple.com/en-us/HT213488
support.apple.com/en-us/HT213489
support.apple.com/en-us/HT213491
support.apple.com/en-us/HT213492
support.apple.com/en-us/HT213495
www.debian.org/security/2022/dsa-5273
www.debian.org/security/2022/dsa-5274
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6 Medium
AI Score
Confidence
High
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.002 Low
EPSS
Percentile
52.3%