{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-23748","assignerOrgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","assignerShortName":"checkpoint","dateUpdated":"2025-10-21T23:15:31.225Z","dateReserved":"2022-01-19T00:00:00.000Z","datePublished":"2022-11-17T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","shortName":"checkpoint","dateUpdated":"2022-12-14T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files."}],"affected":[{"vendor":"n/a","product":"Audinate Dante Application Library for Windows","versions":[{"version":"All versions prior to and including 1.2.0","status":"affected"}]}],"references":[{"url":"https://cpr-zero.checkpoint.com/vulns/cprid-2193/%2C"},{"url":"https://www.audinate.com/learning/faqs/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-114: Process Control","cweId":"CWE-114"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:51:46.009Z"},"title":"CVE Program Container","references":[{"url":"https://cpr-zero.checkpoint.com/vulns/cprid-2193/%2C","tags":["x_transferred"]},{"url":"https://www.audinate.com/learning/faqs/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-23748","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-06T17:19:39.559883Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-02-06","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-23748"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-23748","tags":["government-resource"]}],"timeline":[{"time":"2025-02-06T00:00:00.000Z","lang":"en","value":"CVE-2022-23748 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:15:31.225Z"}}]}}