First published: Tue Jul 02 2024(Updated: )
Vulnerability in Realtek RtsPer driver for PCIe Card Reader (RtsPer.sys) before 10.0.22000.21355 and Realtek RtsUer driver for USB Card Reader (RtsUer.sys) before 10.0.22000.31274 leaks driver logs that contain addresses of kernel mode objects, weakening KASLR.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek RtsPer | <10.0.22000.21355 | |
Realtek RTSUER | <10.0.22000.31274 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25477 is considered a high-severity vulnerability due to its potential impact on kernel address space layout randomization (KASLR).
To fix CVE-2022-25477, update the Realtek RtsPer driver to version 10.0.22000.21355 or later and the RtsUer driver to version 10.0.22000.31274 or later.
CVE-2022-25477 could allow attackers to discover kernel mode object addresses, which undermines security mechanisms like KASLR and increases risk of exploitation.
CVE-2022-25477 affects Realtek RtsPer driver versions before 10.0.22000.21355 and RtsUer driver versions before 10.0.22000.31274.
Using devices with the vulnerable Realtek drivers poses a security risk and it is recommended to update them to the patched versions as soon as possible.