瑞昱半導體股份有限公司
300新竹科學園區創新二路2號
通訊網路產品
- Network Interface Controller & Single Port PHYceiver
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 - DHC
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 - Switch Controllers & Multi-Ports PHYceivers
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 - Wireless LAN ICs
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 - Wired/Wireless Broadband Gateway/Router SoC
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 - DTV Demodulators
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 -
Automotive Ethernet
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它
電腦週邊產品
- AC'97/HD Audio CODECs & Sound ICs
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 - PC HD Audio Codecs/Consumer Audio Codecs/Audio Amplifier/Voice DSP/Card Reader/USB Hub/PC Camera
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它
多媒體產品
- LCD Monitor Controllers
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它
回報產品網路安全問題
- 如果Realtek產品有您認定的網路安全問題或漏洞 , 歡迎您將產品/晶片型號及問題內容描述向我們以下郵箱窗口回報 , 我們會儘速確認並做改善
Email: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它
資訊安全漏洞公告
- [CVE-2019-19705] Realtek Audio Drivers for Windows – DLL preloading and potential Abuses
- [CVE-2021-27372] Realtek xPON router - Insecure credentials leakage
- [CVE-2021-32537] Realtek High Definition Audio Windows driver RTKVHD64.sys Vulnerability
- [CVE-2021-35392][CVE-2021-35393][CVE-2021-35394][CVE-2021-35395] Realtek AP Router SDK Vulnerabilities
- [CVE-2021-36922][CVE-2021-36923][CVE-2021-36924][CVE-2021-36925] Realtek RtsUpx USB Utility Driver Vulnerability
- Realtek Linux/Android Wi-Fi driver – Buffer Overflow Attack may cause a system crash
- [CVE-2022-21742] Realtek USB FE/1GbE/2.5GbE/5GbE NIC Family Vulnerability
- [CVE-2022-25476][CVE-2022-25477][CVE-2022-25478][CVE-2022-25479][CVE-2022-25480] Realtek RtsPer/RtsUer Card Reader Driver Vulnerability
- [CVE-2022-27255] Realtek AP Router SDK Vulnerability
- [CVE-2022-29558] Realtek AP Router SDK Vulnerability
- [CVE-2022-26527] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to Inconsistent SegN in Mesh Transport Layer
- [CVE-2022-26528] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to SegO > SegN in Mesh Transport Layer
- [CVE-2022-26529] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to Inconsistent Message Type in Mesh Transport Layer
- [CVE-2022-25635] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to Abnormal BLE Advertising Length
- [CVE-2022-32966] Realtek DASH firmware vulnerability - TCP Port 5900 is open for connection without valid credentials
- [CVE-2022-32967] Realtek DASH firmware vulnerability - Disabled DASH becomes Enabled after power loss
- [CVE-2022-34326] Ameba1 softap mode spinlock issue
- [CVE-2022-40740] Realtek SDK - Command Injection in GPON router WEBGUI
產品安全致謝
Researchers | CVEs |
---|---|
Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它 | CVE-2022-40740 |
chiba of topsec alphalab | CVE-2022-34326 |
Blake Irwin, Lenovo | CVE-2022-32966, CVE-2022-32967 |
Han Yan(闫晗), Lewei Qu(曲乐炜), Dongxiang Ke(柯懂湘) from Baidu AIoT Security Team | CVE-2022-26527, CVE-2022-26528, CVE-2022-26529, CVE-2022-26535 |
Octavio Gianatiempo, Octavio Galland, Emilio Couto, Javier Aguinaga from Faraday's Security Research team | CVE-2022-29558 |
Octavio Gianatiempo, Octavio Galland, Emilio Couto, Javier Aguinaga from Faraday's Security Research team | CVE-2022-27255 |
Michael Myng | CVE-2022-25476, CVE-2022-25477, CVE-2022-25478, CVE-2022-25479, CVE-2022-25480 |
Eran Shimony | CVE-2022-21742 |
Sili Luo from Security Researcher, Huawei RO0T Lab | CVE-2021-39306, CVE-2021-43573 |
Quentin Kaiser from IoT Inspector's Security Researcher team | CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, CVE-2021-35395 |
Roy Ronen from SentinelOne | CVE-2021-36922, CVE-2021-36923, CVE-2021-36924, CVE-2021-36925 |
Axel Souchet | CVE-2021-32537 |
Maurizio Siddu | CVE-2021-27372 |