Skip to main content

Critical Vulnerability (CVE-2022-27255) in Realtek AP-Router SDK

Proof-of-concept exploit released for a Critical vulnerability in the Realtek AP-Router SDK

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Proof-of-concept exploit released for a Critical vulnerability in the Realtek AP-Router SDK


Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

Proof-of-concept exploit has been released for a critical vulnerability in the Realtek AP-Router software developer kit (SDK). CVE-2022-27255 is a buffer overflow in the Session Initiation Protocol (SIP) and Application Layer Gateway (ALG), affecting networking devices built with the Realtek SDK rtl819x-eCos-v0.x Series and rtl819x-eCos-v1.x Series system-on-chip.  CVE-2022-27255 was patched by Realtek in March 2022, however product vendors utilising the above system-on-chip will need to release separate updates for affected devices.

A remote, unauthenticated attacker could exploit this vulnerability to take control of an affected system.

CVE-2022-27255 under active exploitation

According to high-confidence intelligence from Recorded Future, this vulnerability is now under active exploitation by criminal groups in order to achieve denial of service and remote code execution.


Remediation advice

Organisations are advised to begin assessing their exposure to this vulnerability now by ensuring asset registers are up to date, particularly for low volume networking devices such as small to medium business routers and internet of things devices.

Specifically, organisations should:

  • Conduct discovery activities and document any potentially affected devices within their asset registers.
  • Inform information asset owners where vulnerable devices are identified.
  • Ensure local processes are in place for identifying and issuing emergency firmware updates for affected devices.
  • Update affected devices when patches are available from vendors.

 



Last edited: 23 August 2022 4:23 pm