Apple July 2022 Security Updates addressed vulnerabilities in the following products:
- Safari
- macOS
- watchOS
- tvOS
- iOS and iPadOS
Deploy these patches instantly with the help of a good patch management software.
Some products affected by Apple July 2022 Security Updates:
- Product : macOS
- Affected OS: macOS Catalina 10.15, macOS Monterey, macOS Big Sur
- Affected features: SMB, Spotlight, WebRTC, Liblouis, ImageIO, PackageKit, ICU, Automation, WebKit, GPU Drivers, AppleScript, Calendar, Spdump, Apple Neural Enge, Intel Graphics Driver, Kernel, Multi-Touch, File System Events, Audio, libxml2, AppleMobileFileIntegrity, CoreMedia, APFS, TCC, PlugKit, CoreText, PS Normalizer, Wi-Fi, Wdows Server, iCloud Photo Library, Software Update, FaceTime.
- Impact: Arbitrary Code Execution, Privilege Escalation, Information Disclosure, Denial of Service
- CVEs : CVE-2021-28544, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2021-4192, CVE-2021-4193, CVE-2021-46059, CVE-2022-0128, CVE-2022-0156, CVE-2022-0158, CVE-2022-2294, CVE-2022-24070, CVE-2022-26704, CVE-2022-26981, CVE-2022-29046, CVE-2022-29048, CVE-2022-32781, CVE-2022-32785, CVE-2022-32786, CVE-2022-32787, CVE-2022-32789, CVE-2022-32792, CVE-2022-32793, CVE-2022-32796, CVE-2022-32797, CVE-2022-32798, CVE-2022-32799, CVE-2022-32800, CVE-2022-32801, CVE-2022-32805, CVE-2022-32807, CVE-2022-32810, CVE-2022-32811, CVE-2022-32812, CVE-2022-32813, CVE-2022-32814, CVE-2022-32815, CVE-2022-32816, CVE-2022-32817, CVE-2022-32818, CVE-2022-32819, CVE-2022-32820, CVE-2022-32821, CVE-2022-32823, CVE-2022-32825, CVE-2022-32826, CVE-2022-32828, CVE-2022-32829, CVE-2022-32831, CVE-2022-32832, CVE-2022-32834, CVE-2022-32837, CVE-2022-32838, CVE-2022-32839, CVE-2022-32840, CVE-2022-32841, CVE-2022-32842, CVE-2022-32843, CVE-2022-32845, CVE-2022-32847, CVE-2022-32848, CVE-2022-32849, CVE-2022-32851, CVE-2022-32852, CVE-2022-32853, CVE-2022-32857
- Product: Safari 15.6
- Affected OS: macOS Big Sur and macOS Catalina
- Affected features: Safari Extensions, WebRTC, WebKit
- Impact: Arbitrary Code Execution, Information Disclosure
- CVEs : CVE-2022-32784, CVE-2022-32792, CVE-2022-2294
- Product: watchOS 8.7
- Affected OS: watchOS
- Affected features: APFS, AppleAVD, AppleMobileFileIntegrity, Apple Neural Engine, Audio, CoreText, File System Events, GPU Drivers, ImageIO, ICU, Kernel, Liblouis, libxml2, Multi-Touch, Software Update, WebKit and then Wi_Fi
- Impact: Arbitrary Code Execution, Elevation of Privilege, Information Disclosure, kernel memory Disclosure
- CVEs : CVE-2022-26981, CVE-2022-32787, CVE-2022-32788, CVE-2022-32792, CVE-2022-32793, CVE-2022-32810, CVE-2022-32813, CVE-2022-32814, CVE-2022-32815, CVE-2022-32816, CVE-2022-32817, CVE-2022-32819, CVE-2022-32820, CVE-2022-32821, CVE-2022-32823, CVE-2022-32824, CVE-2022-32825, CVE-2022-32826, CVE-2022-32832, CVE-2022-32839, CVE-2022-32840, CVE-2022-32841, CVE-2022-32844, CVE-2022-32845, CVE-2022-32847, CVE-2022-32857
- Product: tvOS 15.6
- Affected OS: tvOS
- Affected features: APFS, AppleAVD, AppleMobileFileIntegrity, Audio, CoreMedia, CoreText, File System Events, iCloud Photo Library, ICU, ImageIO, Kernel, Liblouis, libxml2, Multi-Touch, Software Update, WebKit and then Wi_Fi
- Impact: Arbitrary Code Execution, Elevation of Privilege, Information Disclosure
- CVEs : CVE-2022-26981, CVE-2022-32787, CVE-2022-32788, CVE-2022-32792, CVE-2022-32793, CVE-2022-32802, CVE-2022-32813, CVE-2022-32814, CVE-2022-32815, CVE-2022-32816, CVE-2022-32817, CVE-2022-32819, CVE-2022-32820, CVE-2022-32821, CVE-2022-32823, CVE-2022-32824, CVE-2022-32825, CVE-2022-32826, CVE-2022-32828, CVE-2022-32830, CVE-2022-32832, CVE-2022-32837, CVE-2022-32839, CVE-2022-32841, CVE-2022-32844, CVE-2022-32847, CVE-2022-32849, CVE-2022-32857
Apple July 2022 Security Updates also addressed it’s main operation systems, the iOS:
- Product : iOS 15.6 and iPadOS 15.6
- Affected OS : iOS and iPadOS
- Affected features: APFS, AppleAVD, AppleMobileFileIntegrity, Apple Neural Engine, Audio, CoreMedia, CoreText, File System Events, GPU Drivers, Home, iCloud Photo Library, ICU, ImageIO, IOMobileFrameBuffer, Safari Extensions, PluginKit, Kernel, Liblouis, libxml2, Multi-Touch, Software Update, WebKit and then Wi_Fi
- Impact: Arbitrary Code Execution, Elevation of Privilege, Information Disclosure
- CVEs : CVE-2022-2294, CVE-2022-26768, CVE-2022-26981, CVE-2022-32784, CVE-2022-32785, CVE-2022-32787, CVE-2022-32788, CVE-2022-32792, CVE-2022-32793, CVE-2022-32802, CVE-2022-32810, CVE-2022-32813, CVE-2022-32814, CVE-2022-32815, CVE-2022-32816, CVE-2022-32817, CVE-2022-32819, CVE-2022-32820, CVE-2022-32821, CVE-2022-32823, CVE-2022-32824, CVE-2022-32825, CVE-2022-32826, CVE-2022-32828, CVE-2022-32829, CVE-2022-32830, CVE-2022-32832, CVE-2022-32837, CVE-2022-32838, CVE-2022-32839, CVE-2022-32840, CVE-2022-32841, CVE-2022-32844, CVE-2022-32845, CVE-2022-32847, CVE-2022-32849, CVE-2022-32855, CVE-2022-32857
However, SanerNow VM and SanerNow PM detect and automatically fix these vulnerabilities by applying security updates. Therefore, use SanerNow and keep your systems updated and secure.