瑞昱半导体股份有限公司
300新竹科学园区创新二路2号
通讯网络产品
- Network Interface Controller & Single Port PHYceiver
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - DHC
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - Switch Controllers & Multi-Ports PHYceivers
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - Wireless LAN ICs
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - Wired/Wireless Broadband Gateway/Router SoC
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - DTV Demodulators
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - Automotive Ethernet
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。
计算机外设产品
- AC'97/HD Audio CODECs & Sound ICs
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 - PC HD Audio Codecs/Consumer Audio Codecs/Audio Amplifier/Voice DSP/Card Reader/USB Hub/PC Camera
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。
多媒体产品
- LCD Monitor Controllers
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。
回报产品网路安全问题
- 如果Realtek产品有您认定的网路安全问题或漏洞 , 欢迎您将产品/晶片型号及问题内容描述向我们以下邮箱窗口回报 , 我们会尽速确认并做改善
Email: 该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。
资讯安全漏洞公告
- [CVE-2019-19705] Realtek Audio Drivers for Windows – DLL preloading and potential Abuses
- [CVE-2021-27372] Realtek xPON router - Insecure credentials leakage
- [CVE-2021-32537] Realtek High Definition Audio Windows driver RTKVHD64.sys Vulnerability
- [CVE-2021-35392][CVE-2021-35393][CVE-2021-35394][CVE-2021-35395] Realtek AP Router SDK Vulnerabilities
- [CVE-2021-36922][CVE-2021-36923][CVE-2021-36924][CVE-2021-36925] Realtek RtsUpx USB Utility Driver Vulnerability
- Realtek Linux/Android Wi-Fi driver – Buffer Overflow Attack may cause a system crash
- [CVE-2022-21742] Realtek USB FE/1GbE/2.5GbE/5GbE NIC Family Vulnerability
- [CVE-2022-25476][CVE-2022-25477][CVE-2022-25478][CVE-2022-25479][CVE-2022-25480] Realtek RtsPer/RtsUer Card Reader Driver Vulnerability
- [CVE-2022-27255] Realtek AP Router SDK Vulnerability
- [CVE-2022-29558] Realtek AP Router SDK Vulnerability
- [CVE-2022-26527] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to Inconsistent SegN in Mesh Transport Layer
- [CVE-2022-26528] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to SegO > SegN in Mesh Transport Layer
- [CVE-2022-26529] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to Inconsistent Message Type in Mesh Transport Layer
- [CVE-2022-25635] Realtek Linux/Android Bluetooth Mesh SDK – An Out-of-bound Write Due to Abnormal BLE Advertising Length
- [CVE-2022-32966] Realtek DASH firmware vulnerability - TCP Port 5900 is open for connection without valid credentials
- [CVE-2022-32967] Realtek DASH firmware vulnerability - Disabled DASH becomes Enabled after power loss
- [CVE-2022-34326] Ameba1 softap mode spinlock issue
- [CVE-2022-40740] Realtek SDK - Command Injection in GPON router WEBGUI
产品安全致谢
Researchers | CVEs |
---|---|
该 Email 地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。 | CVE-2022-40740 |
chiba of topsec alphalab | CVE-2022-34326 |
Blake Irwin, Lenovo | CVE-2022-32966, CVE-2022-32967 |
Han Yan(闫晗), Lewei Qu(曲乐炜), Dongxiang Ke(柯懂湘) from Baidu AIoT Security Team | CVE-2022-26527, CVE-2022-26528, CVE-2022-26529, CVE-2022-26535 |
Octavio Gianatiempo, Octavio Galland, Emilio Couto, Javier Aguinaga from Faraday's Security Research team | CVE-2022-29558 |
Octavio Gianatiempo, Octavio Galland, Emilio Couto, Javier Aguinaga from Faraday's Security Research team | CVE-2022-27255 |
Michael Myng | CVE-2022-25476, CVE-2022-25477, CVE-2022-25478, CVE-2022-25479, CVE-2022-25480 |
Eran Shimony | CVE-2022-21742 |
Sili Luo from Security Researcher, Huawei RO0T Lab | CVE-2021-39306, CVE-2021-43573 |
Quentin Kaiser from IoT Inspector's Security Researcher team | CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, CVE-2021-35395 |
Roy Ronen from SentinelOne | CVE-2021-36922, CVE-2021-36923, CVE-2021-36924, CVE-2021-36925 |
Axel Souchet | CVE-2021-32537 |
Maurizio Siddu | CVE-2021-27372 |