Vulnerability Description
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realtek | Ecos Rsdk Firmware | 1.5.7p1 |
| Realtek | Ecos Rsdk | - |
| Realtek | Ecos Msdk Firmware | 4.9.4p1 |
| Realtek | Ecos Msdk | - |
Related Weaknesses (CWE)
References
- https://forum.defcon.org/node/241835Third Party Advisory
- https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-202Vendor Advisory
- https://forum.defcon.org/node/241835Third Party Advisory
- https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-202Vendor Advisory
FAQ
What is CVE-2022-27255?
CVE-2022-27255 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication vi...
How severe is CVE-2022-27255?
CVE-2022-27255 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-27255?
Check the references section above for vendor advisories and patch information. Affected products include: Realtek Ecos Rsdk Firmware, Realtek Ecos Rsdk, Realtek Ecos Msdk Firmware, Realtek Ecos Msdk.