Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://zwclose.github.io/2024/10/14/rtsper1.html |
|
Thu, 24 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Realtek
Realtek sd Card Reader Driver |
|
| CPEs | cpe:2.3:a:realtek:sd_card_reader_driver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Realtek
Realtek sd Card Reader Driver |
|
| Metrics |
cvssV3_1
|
Wed, 23 Oct 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A lack of input validation in Realtek SD card reader driver before 10.0.26100.21374 through the implementation of the IOCTL_SCSI_PASS_THROUGH control of the SD card reader driver allows an attacker to write to predictable kernel memory locations, even as a low-privileged user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-24T17:43:32.664Z
Reserved: 2024-07-05T00:00:00.000Z
Link: CVE-2024-40431
Updated: 2024-10-24T17:43:27.488Z
Status : Deferred
Published: 2024-10-23T22:15:02.340
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-40431
No data.
OpenCVE Enrichment
No data.
No weakness.