CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
19.8%
Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services.
Vendor | Product | Version | CPE |
---|---|---|---|
realtek | rtl8156_firmware | * | cpe:2.3:o:realtek:rtl8156_firmware:*:*:*:*:*:*:*:* |
realtek | rtl8156 | - | cpe:2.3:h:realtek:rtl8156:-:*:*:*:*:*:*:* |
realtek | rtl8156b_firmware | * | cpe:2.3:o:realtek:rtl8156b_firmware:*:*:*:*:*:*:*:* |
realtek | rtl8156b | - | cpe:2.3:h:realtek:rtl8156b:-:*:*:*:*:*:*:* |
realtek | rtl8153_firmware | * | cpe:2.3:o:realtek:rtl8153_firmware:*:*:*:*:*:*:*:* |
realtek | rtl8153 | - | cpe:2.3:h:realtek:rtl8153:-:*:*:*:*:*:*:* |
realtek | rtl8153b_firmware | * | cpe:2.3:o:realtek:rtl8153b_firmware:*:*:*:*:*:*:*:* |
realtek | rtl8153b | - | cpe:2.3:h:realtek:rtl8153b:-:*:*:*:*:*:*:* |
realtek | rtl8154_firmware | * | cpe:2.3:o:realtek:rtl8154_firmware:*:*:*:*:*:*:*:* |
realtek | rtl8154 | - | cpe:2.3:h:realtek:rtl8154:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
19.8%