fkie_cve-2022-34405
Vulnerability from fkie_nvd
Published
2023-01-26 21:15
Modified
2024-11-21 07:09
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Summary
An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "98CB7144-FD1C-4981-864F-6638AB9C44B9", "versionEndExcluding": "6.0.9433.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:alienware_m15_ryzen_edition_r5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDDF9040-D1A2-4F53-B2A1-60A56A401DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g15_5515:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6D554-0CEC-411C-9D44-A0F3AE3D3A07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EDDF929-01EF-407A-B0DC-36D08F71AB61", "versionEndExcluding": "6.0.9400.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:alienware_m15_r6:-:*:*:*:*:*:*:*", "matchCriteriaId": "588DBF4B-7D6A-4DF6-82F0-2B5191D39E2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C4737-DAD8-4921-B65C-8D11669B730D", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CB2ED33-8E4C-4B0F-ABBE-1083A958B9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "644D168B-A2C6-49FB-A5FD-6653027EF2B0", "versionEndExcluding": "6.0.9394.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D164D6A-F610-4654-AB17-AB14E7877D93", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "D355D92F-71AB-4D6D-9D3D-85A0BF4133E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C32F25E-2F1F-409D-85DF-15CCAB423DD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F0C34FD-6A6D-43BF-B548-13D57532AF8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A0FE69C-31CE-49B5-ABB8-1308C75F401C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_aurora_r9:-:*:*:*:*:*:*:*", "matchCriteriaId": "671390B3-182F-46AC-9883-2BD48C58D490", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m15_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01EDB58-FA41-4E7B-860C-53FA5B00B606", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7613F524-EAA8-4976-8C35-4ABCD555FC63", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCCE762E-FB6C-4493-A21F-347DE5CB57E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B084185F-1C0D-47D9-9F72-A79095462428", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m17_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "656DECD6-D29F-4241-90CD-0B190581F674", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE56E5E4-52FA-4BE7-8B58-8F258B29BE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C631E678-90F0-4DB2-8AB8-7378EC32FAC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B49A7E9-EA33-4614-B91D-465D32407BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", "matchCriteriaId": "2544FF74-2830-4B7C-BE87-064B971C19D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9AA2CC-6E81-4987-A888-E82D2949EF3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*", "matchCriteriaId": "331F9E85-4F7F-4C28-A403-EE8D8476FC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE3DF41E-0328-4AE0-B755-8B6269185BE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "35B3AFF4-11E7-428B-ACE7-13C6263896F2", "versionEndExcluding": "6.0.9407.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "20046D13-2EE4-438C-8C98-089D018ADD44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55EDCF9-6460-4F87-9142-1B9FACCEFAAA", "versionEndExcluding": "6.0.9388.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", "matchCriteriaId": "486DCCF7-79D9-45C1-8CBD-26FB78705F91", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "51D0F21C-C85D-463E-B45F-951FFC3DD527", "versionEndExcluding": "6.0.9254.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:g3_3590:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ACD77D7-9AE6-4E24-9EE6-EDD81ABCCF45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:realtek_high_definition_audio_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D19C0C1-3FC5-48E8-A2F2-0B2AD592DAFC", "versionEndExcluding": "6.0.9422.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "79C0E8D8-FE8F-4718-8837-8C8FCACDB095", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A8617F-56B1-4998-98CC-FA8C1D3DE011", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.\n\n" }, { "lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de control de acceso inadecuado en Realtek audio driver. Un usuario malicioso autenticado local puede potencialmente explotar esta vulnerabilidad esperando a que un administrador inicie la aplicaci\u00f3n y se conecte al proceso para elevar los privilegios en el sistema." } ], "id": "CVE-2022-34405", "lastModified": "2024-11-21T07:09:27.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-26T21:15:42.883", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000205721/dsa-2022-316-dell-client-security-update-for-a-realtek-high-definition-audio-driver-vulnerability" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.