Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR.
References
Link | Resource |
---|---|
http://realtek.com | Broken Link |
https://gist.github.com/zwclose/feb16f1424779a61cb1d9f6d5681408a | Third Party Advisory |
https://www.realtek.com/images/safe-report/Realtek_RtsPer_RtsUer_Security_Advisory_Report.pdf | Vendor Advisory |
https://zwclose.github.io/2024/10/14/rtsper1.html | |
http://realtek.com | Broken Link |
https://gist.github.com/zwclose/feb16f1424779a61cb1d9f6d5681408a | Third Party Advisory |
https://www.realtek.com/images/safe-report/Realtek_RtsPer_RtsUer_Security_Advisory_Report.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-02 19:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25477
Mitre link : CVE-2022-25477
CVE.ORG link : CVE-2022-25477
JSON object : View
Products Affected
realtek
- rtsuer
- rtsper
CWE
CWE-532
Insertion of Sensitive Information into Log File