CVE-2022-34405
Vulnerability from cvelistv5
Published
2023-01-25 16:15
Modified
2024-08-03 09:07
Summary
An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:07:16.290Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Alienware m15 Ryzen Edition R5",
            "Alienware m15 R6",
            "Dell G5 5090",
            "Dell G5 5000",
            "Alienware Area 51m R2",
            "Dell G7 7500",
            "Dell G7 7700",
            "Alienware x15 R1",
            "Alienware x17 R1",
            "Alienware m15 R1",
            "Alienware m17 R1",
            "Dell Gaming G3 3590",
            "Dell G3 3500",
            "Dell G5 5500",
            "Alienware Area 51m R1",
            "Alienware Aurora R8",
            "Dell G15 5515",
            "Dell G15 5510",
            "Dell G15 5511",
            "Alienware Aurora R10",
            "Alienware Aurora R9",
            "Alienware Aurora R11",
            "Alienware Aurora R12",
            "Alienware m15 R3",
            "Alienware m15 R4",
            "Alienware m17 R3",
            "Alienware m17 R4",
            "Dell G5 5590",
            "Dell G7 7590",
            "Dell G7 7790",
            "Alienware Aurora R13",
            "Alienware m15 R2",
            "Alienware m17 R2"
          ],
          "product": "CPG Drivers",
          "vendor": "Dell",
          "versions": [
            {
              "status": "unaffected",
              "version": "6.0.9433.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9400.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9394.1"
            },
            {
              "status": "unaffected",
              "version": "1.37.275.0"
            },
            {
              "status": "unaffected",
              "version": "6.0.9407.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9388.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9254.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9422.1"
            }
          ]
        }
      ],
      "datePublic": "2022-12-16T06:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\u003c/span\u003e\n\n"
            }
          ],
          "value": "An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285: Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-25T16:15:47.389Z",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2022-34405",
    "datePublished": "2023-01-25T16:15:43.535Z",
    "dateReserved": "2022-06-23T18:55:17.101Z",
    "dateUpdated": "2024-08-03T09:07:16.290Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9433.1\", \"matchCriteriaId\": \"98CB7144-FD1C-4981-864F-6638AB9C44B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_ryzen_edition_r5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDDF9040-D1A2-4F53-B2A1-60A56A401DDA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g15_5515:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD6D554-0CEC-411C-9D44-A0F3AE3D3A07\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9400.1\", \"matchCriteriaId\": \"4EDDF929-01EF-407A-B0DC-36D08F71AB61\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"588DBF4B-7D6A-4DF6-82F0-2B5191D39E2E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE6C4737-DAD8-4921-B65C-8D11669B730D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CB2ED33-8E4C-4B0F-ABBE-1083A958B9D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9394.1\", \"matchCriteriaId\": \"644D168B-A2C6-49FB-A5FD-6653027EF2B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D164D6A-F610-4654-AB17-AB14E7877D93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D355D92F-71AB-4D6D-9D3D-85A0BF4133E5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C32F25E-2F1F-409D-85DF-15CCAB423DD5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F0C34FD-6A6D-43BF-B548-13D57532AF8C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A0FE69C-31CE-49B5-ABB8-1308C75F401C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"671390B3-182F-46AC-9883-2BD48C58D490\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C01EDB58-FA41-4E7B-860C-53FA5B00B606\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7613F524-EAA8-4976-8C35-4ABCD555FC63\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCCE762E-FB6C-4493-A21F-347DE5CB57E0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B084185F-1C0D-47D9-9F72-A79095462428\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"656DECD6-D29F-4241-90CD-0B190581F674\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE56E5E4-52FA-4BE7-8B58-8F258B29BE2B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C631E678-90F0-4DB2-8AB8-7378EC32FAC0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B49A7E9-EA33-4614-B91D-465D32407BE3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2544FF74-2830-4B7C-BE87-064B971C19D3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB9AA2CC-6E81-4987-A888-E82D2949EF3C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"331F9E85-4F7F-4C28-A403-EE8D8476FC5E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE3DF41E-0328-4AE0-B755-8B6269185BE5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9407.1\", \"matchCriteriaId\": \"35B3AFF4-11E7-428B-ACE7-13C6263896F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20046D13-2EE4-438C-8C98-089D018ADD44\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9388.1\", \"matchCriteriaId\": \"A55EDCF9-6460-4F87-9142-1B9FACCEFAAA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"486DCCF7-79D9-45C1-8CBD-26FB78705F91\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9254.1\", \"matchCriteriaId\": \"51D0F21C-C85D-463E-B45F-951FFC3DD527\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACD77D7-9AE6-4E24-9EE6-EDD81ABCCF45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9422.1\", \"matchCriteriaId\": \"5D19C0C1-3FC5-48E8-A2F2-0B2AD592DAFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C0E8D8-FE8F-4718-8837-8C8FCACDB095\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81A8617F-56B1-4998-98CC-FA8C1D3DE011\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Se identific\\u00f3 una vulnerabilidad de control de acceso inadecuado en Realtek audio driver. Un usuario malicioso autenticado local puede potencialmente explotar esta vulnerabilidad esperando a que un administrador inicie la aplicaci\\u00f3n y se conecte al proceso para elevar los privilegios en el sistema.\"}]",
      "id": "CVE-2022-34405",
      "lastModified": "2024-11-21T07:09:27.440",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security_alert@emc.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}]}",
      "published": "2023-01-26T21:15:42.883",
      "references": "[{\"url\": \"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security_alert@emc.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security_alert@emc.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-285\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-34405\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2023-01-26T21:15:42.883\",\"lastModified\":\"2024-11-21T07:09:27.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Se identific\u00f3 una vulnerabilidad de control de acceso inadecuado en Realtek audio driver. Un usuario malicioso autenticado local puede potencialmente explotar esta vulnerabilidad esperando a que un administrador inicie la aplicaci\u00f3n y se conecte al proceso para elevar los privilegios en el sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9433.1\",\"matchCriteriaId\":\"98CB7144-FD1C-4981-864F-6638AB9C44B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_ryzen_edition_r5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDDF9040-D1A2-4F53-B2A1-60A56A401DDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g15_5515:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6D554-0CEC-411C-9D44-A0F3AE3D3A07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9400.1\",\"matchCriteriaId\":\"4EDDF929-01EF-407A-B0DC-36D08F71AB61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588DBF4B-7D6A-4DF6-82F0-2B5191D39E2E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE6C4737-DAD8-4921-B65C-8D11669B730D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB2ED33-8E4C-4B0F-ABBE-1083A958B9D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9394.1\",\"matchCriteriaId\":\"644D168B-A2C6-49FB-A5FD-6653027EF2B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D164D6A-F610-4654-AB17-AB14E7877D93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D355D92F-71AB-4D6D-9D3D-85A0BF4133E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C32F25E-2F1F-409D-85DF-15CCAB423DD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0C34FD-6A6D-43BF-B548-13D57532AF8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0FE69C-31CE-49B5-ABB8-1308C75F401C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"671390B3-182F-46AC-9883-2BD48C58D490\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01EDB58-FA41-4E7B-860C-53FA5B00B606\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7613F524-EAA8-4976-8C35-4ABCD555FC63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCE762E-FB6C-4493-A21F-347DE5CB57E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B084185F-1C0D-47D9-9F72-A79095462428\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656DECD6-D29F-4241-90CD-0B190581F674\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE56E5E4-52FA-4BE7-8B58-8F258B29BE2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C631E678-90F0-4DB2-8AB8-7378EC32FAC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B49A7E9-EA33-4614-B91D-465D32407BE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2544FF74-2830-4B7C-BE87-064B971C19D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9AA2CC-6E81-4987-A888-E82D2949EF3C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331F9E85-4F7F-4C28-A403-EE8D8476FC5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE3DF41E-0328-4AE0-B755-8B6269185BE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9407.1\",\"matchCriteriaId\":\"35B3AFF4-11E7-428B-ACE7-13C6263896F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20046D13-2EE4-438C-8C98-089D018ADD44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9388.1\",\"matchCriteriaId\":\"A55EDCF9-6460-4F87-9142-1B9FACCEFAAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"486DCCF7-79D9-45C1-8CBD-26FB78705F91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9254.1\",\"matchCriteriaId\":\"51D0F21C-C85D-463E-B45F-951FFC3DD527\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD77D7-9AE6-4E24-9EE6-EDD81ABCCF45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9422.1\",\"matchCriteriaId\":\"5D19C0C1-3FC5-48E8-A2F2-0B2AD592DAFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C0E8D8-FE8F-4718-8837-8C8FCACDB095\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A8617F-56B1-4998-98CC-FA8C1D3DE011\"}]}]}],\"references\":[{\"url\":\"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.