First published: Thu Nov 17 2022(Updated: )
Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Audinate Dante Discovery | ||
All of | ||
Audinate Dante Application Library | <=1.2.0 | |
Microsoft Windows Operating System | ||
Audinate Dante Application Library | <=1.2.0 | |
Microsoft Windows Operating System |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23748 is classified as a medium severity vulnerability due to its potential for DLL sideloading attacks.
To remediate CVE-2022-23748, users should update the Dante Application Library to version 1.2.1 or later.
CVE-2022-23748 specifically affects the Audinate Dante Application Library versions up to and including 1.2.0.
CVE-2022-23748 allows for arbitrary code execution through a DLL sideloading attack.
Audinate is responsible for addressing vulnerabilities associated with the Dante Application Library, including CVE-2022-23748.