Vulnerability Description
g810-led 0.4.2, a LED configuration tool for Logitech Gx10 keyboards, contained a udev rule to make supported device nodes world-readable and writable, allowing any process on the system to read traffic from keyboards, including sensitive data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| G810-Led Project | G810-Led | 0.4.2 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/1024998Issue TrackingThird Party Advisory
- https://github.com/MatMoul/g810-led/pull/297PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/12/msg00002.htmlMailing ListThird Party Advisory
- https://bugs.debian.org/1024998Issue TrackingThird Party Advisory
- https://github.com/MatMoul/g810-led/pull/297PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/12/msg00002.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2022-46338?
CVE-2022-46338 is a vulnerability with a CVSS score of 6.5 (MEDIUM). g810-led 0.4.2, a LED configuration tool for Logitech Gx10 keyboards, contained a udev rule to make supported device nodes world-readable and writable, allowing any process on the system to read traff...
How severe is CVE-2022-46338?
CVE-2022-46338 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46338?
Check the references section above for vendor advisories and patch information. Affected products include: G810-Led Project G810-Led, Debian Debian Linux.