CRITICAL · 9.8

CVE-2022-27255

In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication vi...

Vulnerability Description

In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
RealtekEcos Rsdk Firmware1.5.7p1
RealtekEcos Rsdk-
RealtekEcos Msdk Firmware4.9.4p1
RealtekEcos Msdk-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-27255?

CVE-2022-27255 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication vi...

How severe is CVE-2022-27255?

CVE-2022-27255 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2022-27255?

Check the references section above for vendor advisories and patch information. Affected products include: Realtek Ecos Rsdk Firmware, Realtek Ecos Rsdk, Realtek Ecos Msdk Firmware, Realtek Ecos Msdk.