This page was not yet optimized for use on mobile devices.
CVE-2022-32870
Data ?
Vulnerability ID | CVE-2022-32870 |
---|---|
Published on | 01.11.2022 20:15 |
Severity | LOW |
Vulnerable configurations ?
-
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*,
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:ipad2:*,
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:iphone:*,
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:ipodtouch:*,
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*,
cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone:*:*:*:*:*,
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*,
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*,
cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*,
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
- Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
- Strong Customer Authentication pour Apple Pay sur iPhone SE (de seconde génération) exécutant iOS 14.5.1 Version 18E212
- Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
- Apple macOS 11 Big Sur: Contacts
- Apple FileVault 2 on T2 systems running macOS Catalina 10.15
- Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212
- macOS Catalina 10.15
- Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
- Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
- Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))