Vulnerability Details : CVE-2022-23748
mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files.
Published
2022-11-17 23:15:14
Updated
2022-12-23 17:03:11
Vulnerability category: File inclusion
Products affected by CVE-2022-23748
- cpe:2.3:a:audinate:dante_application_library:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23748
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23748
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-23748
-
Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker.Assigned by: cve@checkpoint.com (Secondary)
-
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-23748
-
https://www.audinate.com/learning/faqs/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748
Audinate Response to Dante Discovery (mDNSResponder.exe) Security Issue (CVE-2022-23748) | Audinate | FAQsVendor Advisory
-
https://cpr-zero.checkpoint.com/vulns/cprid-2193/,
CPR-ZeroBroken Link
Jump to