CVE-2022-34405 (GCVE-0-2022-34405)

Vulnerability from cvelistv5 – Published: 2023-01-25 16:15 – Updated: 2025-03-28 14:53
VLAI?
Summary
An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.
CWE
Assigner
References
Impacted products
Vendor Product Version
Dell CPG Drivers Unaffected: 6.0.9433.1
Unaffected: 6.0.9400.1
Unaffected: 6.0.9394.1
Unaffected: 1.37.275.0
Unaffected: 6.0.9407.1
Unaffected: 6.0.9388.1
Unaffected: 6.0.9254.1
Unaffected: 6.0.9422.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:07:16.290Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-34405",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-28T14:53:27.720548Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-28T14:53:39.273Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Alienware m15 Ryzen Edition R5",
            "Alienware m15 R6",
            "Dell G5 5090",
            "Dell G5 5000",
            "Alienware Area 51m R2",
            "Dell G7 7500",
            "Dell G7 7700",
            "Alienware x15 R1",
            "Alienware x17 R1",
            "Alienware m15 R1",
            "Alienware m17 R1",
            "Dell Gaming G3 3590",
            "Dell G3 3500",
            "Dell G5 5500",
            "Alienware Area 51m R1",
            "Alienware Aurora R8",
            "Dell G15 5515",
            "Dell G15 5510",
            "Dell G15 5511",
            "Alienware Aurora R10",
            "Alienware Aurora R9",
            "Alienware Aurora R11",
            "Alienware Aurora R12",
            "Alienware m15 R3",
            "Alienware m15 R4",
            "Alienware m17 R3",
            "Alienware m17 R4",
            "Dell G5 5590",
            "Dell G7 7590",
            "Dell G7 7790",
            "Alienware Aurora R13",
            "Alienware m15 R2",
            "Alienware m17 R2"
          ],
          "product": "CPG Drivers",
          "vendor": "Dell",
          "versions": [
            {
              "status": "unaffected",
              "version": "6.0.9433.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9400.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9394.1"
            },
            {
              "status": "unaffected",
              "version": "1.37.275.0"
            },
            {
              "status": "unaffected",
              "version": "6.0.9407.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9388.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9254.1"
            },
            {
              "status": "unaffected",
              "version": "6.0.9422.1"
            }
          ]
        }
      ],
      "datePublic": "2022-12-16T06:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\u003c/span\u003e\n\n"
            }
          ],
          "value": "An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285: Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-25T16:15:47.389Z",
        "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
        "shortName": "dell"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
    "assignerShortName": "dell",
    "cveId": "CVE-2022-34405",
    "datePublished": "2023-01-25T16:15:43.535Z",
    "dateReserved": "2022-06-23T18:55:17.101Z",
    "dateUpdated": "2025-03-28T14:53:39.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9433.1\", \"matchCriteriaId\": \"98CB7144-FD1C-4981-864F-6638AB9C44B9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_ryzen_edition_r5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDDF9040-D1A2-4F53-B2A1-60A56A401DDA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g15_5515:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD6D554-0CEC-411C-9D44-A0F3AE3D3A07\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9400.1\", \"matchCriteriaId\": \"4EDDF929-01EF-407A-B0DC-36D08F71AB61\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"588DBF4B-7D6A-4DF6-82F0-2B5191D39E2E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE6C4737-DAD8-4921-B65C-8D11669B730D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CB2ED33-8E4C-4B0F-ABBE-1083A958B9D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9394.1\", \"matchCriteriaId\": \"644D168B-A2C6-49FB-A5FD-6653027EF2B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D164D6A-F610-4654-AB17-AB14E7877D93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D355D92F-71AB-4D6D-9D3D-85A0BF4133E5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C32F25E-2F1F-409D-85DF-15CCAB423DD5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F0C34FD-6A6D-43BF-B548-13D57532AF8C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A0FE69C-31CE-49B5-ABB8-1308C75F401C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"671390B3-182F-46AC-9883-2BD48C58D490\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C01EDB58-FA41-4E7B-860C-53FA5B00B606\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7613F524-EAA8-4976-8C35-4ABCD555FC63\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCCE762E-FB6C-4493-A21F-347DE5CB57E0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B084185F-1C0D-47D9-9F72-A79095462428\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"656DECD6-D29F-4241-90CD-0B190581F674\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE56E5E4-52FA-4BE7-8B58-8F258B29BE2B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C631E678-90F0-4DB2-8AB8-7378EC32FAC0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B49A7E9-EA33-4614-B91D-465D32407BE3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2544FF74-2830-4B7C-BE87-064B971C19D3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB9AA2CC-6E81-4987-A888-E82D2949EF3C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"331F9E85-4F7F-4C28-A403-EE8D8476FC5E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE3DF41E-0328-4AE0-B755-8B6269185BE5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9407.1\", \"matchCriteriaId\": \"35B3AFF4-11E7-428B-ACE7-13C6263896F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20046D13-2EE4-438C-8C98-089D018ADD44\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9388.1\", \"matchCriteriaId\": \"A55EDCF9-6460-4F87-9142-1B9FACCEFAAA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"486DCCF7-79D9-45C1-8CBD-26FB78705F91\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9254.1\", \"matchCriteriaId\": \"51D0F21C-C85D-463E-B45F-951FFC3DD527\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ACD77D7-9AE6-4E24-9EE6-EDD81ABCCF45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"6.0.9422.1\", \"matchCriteriaId\": \"5D19C0C1-3FC5-48E8-A2F2-0B2AD592DAFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C0E8D8-FE8F-4718-8837-8C8FCACDB095\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81A8617F-56B1-4998-98CC-FA8C1D3DE011\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Se identific\\u00f3 una vulnerabilidad de control de acceso inadecuado en Realtek audio driver. Un usuario malicioso autenticado local puede potencialmente explotar esta vulnerabilidad esperando a que un administrador inicie la aplicaci\\u00f3n y se conecte al proceso para elevar los privilegios en el sistema.\"}]",
      "id": "CVE-2022-34405",
      "lastModified": "2024-11-21T07:09:27.440",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security_alert@emc.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}]}",
      "published": "2023-01-26T21:15:42.883",
      "references": "[{\"url\": \"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\", \"source\": \"security_alert@emc.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security_alert@emc.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security_alert@emc.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-285\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-34405\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2023-01-26T21:15:42.883\",\"lastModified\":\"2024-11-21T07:09:27.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Se identific\u00f3 una vulnerabilidad de control de acceso inadecuado en Realtek audio driver. Un usuario malicioso autenticado local puede potencialmente explotar esta vulnerabilidad esperando a que un administrador inicie la aplicaci\u00f3n y se conecte al proceso para elevar los privilegios en el sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9433.1\",\"matchCriteriaId\":\"98CB7144-FD1C-4981-864F-6638AB9C44B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_ryzen_edition_r5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDDF9040-D1A2-4F53-B2A1-60A56A401DDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g15_5515:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6D554-0CEC-411C-9D44-A0F3AE3D3A07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9400.1\",\"matchCriteriaId\":\"4EDDF929-01EF-407A-B0DC-36D08F71AB61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588DBF4B-7D6A-4DF6-82F0-2B5191D39E2E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE6C4737-DAD8-4921-B65C-8D11669B730D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB2ED33-8E4C-4B0F-ABBE-1083A958B9D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9394.1\",\"matchCriteriaId\":\"644D168B-A2C6-49FB-A5FD-6653027EF2B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D164D6A-F610-4654-AB17-AB14E7877D93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D355D92F-71AB-4D6D-9D3D-85A0BF4133E5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C32F25E-2F1F-409D-85DF-15CCAB423DD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0C34FD-6A6D-43BF-B548-13D57532AF8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A0FE69C-31CE-49B5-ABB8-1308C75F401C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"671390B3-182F-46AC-9883-2BD48C58D490\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01EDB58-FA41-4E7B-860C-53FA5B00B606\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7613F524-EAA8-4976-8C35-4ABCD555FC63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCE762E-FB6C-4493-A21F-347DE5CB57E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B084185F-1C0D-47D9-9F72-A79095462428\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656DECD6-D29F-4241-90CD-0B190581F674\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE56E5E4-52FA-4BE7-8B58-8F258B29BE2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C631E678-90F0-4DB2-8AB8-7378EC32FAC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B49A7E9-EA33-4614-B91D-465D32407BE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2544FF74-2830-4B7C-BE87-064B971C19D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9AA2CC-6E81-4987-A888-E82D2949EF3C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331F9E85-4F7F-4C28-A403-EE8D8476FC5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE3DF41E-0328-4AE0-B755-8B6269185BE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9407.1\",\"matchCriteriaId\":\"35B3AFF4-11E7-428B-ACE7-13C6263896F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20046D13-2EE4-438C-8C98-089D018ADD44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9388.1\",\"matchCriteriaId\":\"A55EDCF9-6460-4F87-9142-1B9FACCEFAAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"486DCCF7-79D9-45C1-8CBD-26FB78705F91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9254.1\",\"matchCriteriaId\":\"51D0F21C-C85D-463E-B45F-951FFC3DD527\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD77D7-9AE6-4E24-9EE6-EDD81ABCCF45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.9422.1\",\"matchCriteriaId\":\"5D19C0C1-3FC5-48E8-A2F2-0B2AD592DAFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C0E8D8-FE8F-4718-8837-8C8FCACDB095\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A8617F-56B1-4998-98CC-FA8C1D3DE011\"}]}]}],\"references\":[{\"url\":\"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T09:07:16.290Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-34405\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-28T14:53:27.720548Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-28T14:53:31.255Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Dell\", \"product\": \"CPG Drivers\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"6.0.9433.1\"}, {\"status\": \"unaffected\", \"version\": \"6.0.9400.1\"}, {\"status\": \"unaffected\", \"version\": \"6.0.9394.1\"}, {\"status\": \"unaffected\", \"version\": \"1.37.275.0\"}, {\"status\": \"unaffected\", \"version\": \"6.0.9407.1\"}, {\"status\": \"unaffected\", \"version\": \"6.0.9388.1\"}, {\"status\": \"unaffected\", \"version\": \"6.0.9254.1\"}, {\"status\": \"unaffected\", \"version\": \"6.0.9422.1\"}], \"platforms\": [\"Alienware m15 Ryzen Edition R5\", \"Alienware m15 R6\", \"Dell G5 5090\", \"Dell G5 5000\", \"Alienware Area 51m R2\", \"Dell G7 7500\", \"Dell G7 7700\", \"Alienware x15 R1\", \"Alienware x17 R1\", \"Alienware m15 R1\", \"Alienware m17 R1\", \"Dell Gaming G3 3590\", \"Dell G3 3500\", \"Dell G5 5500\", \"Alienware Area 51m R1\", \"Alienware Aurora R8\", \"Dell G15 5515\", \"Dell G15 5510\", \"Dell G15 5511\", \"Alienware Aurora R10\", \"Alienware Aurora R9\", \"Alienware Aurora R11\", \"Alienware Aurora R12\", \"Alienware m15 R3\", \"Alienware m15 R4\", \"Alienware m17 R3\", \"Alienware m17 R4\", \"Dell G5 5590\", \"Dell G7 7590\", \"Dell G7 7790\", \"Alienware Aurora R13\", \"Alienware m15 R2\", \"Alienware m17 R2\"], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2022-12-16T06:30:00.000Z\", \"references\": [{\"url\": \"https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\u003c/span\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"CWE-285: Improper Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"c550e75a-17ff-4988-97f0-544cde3820fe\", \"shortName\": \"dell\", \"dateUpdated\": \"2023-01-25T16:15:47.389Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-34405\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-28T14:53:39.273Z\", \"dateReserved\": \"2022-06-23T18:55:17.101Z\", \"assignerOrgId\": \"c550e75a-17ff-4988-97f0-544cde3820fe\", \"datePublished\": \"2023-01-25T16:15:43.535Z\", \"assignerShortName\": \"dell\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…