INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 5h Global ransomware Financial Services / Cybersecurity CRITICAL 5h Global vulnerability Information Technology / Cybersecurity CRITICAL 7h Global malware Energy and Utilities CRITICAL 8h Global ransomware Multiple sectors CRITICAL 8h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 11h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 11h Global phishing Multiple sectors HIGH 12h Global insider Cybersecurity Services CRITICAL 12h Global ransomware Multiple sectors (U.S. companies) CRITICAL 12h Global data_breach Government CRITICAL 5h Global ransomware Financial Services / Cybersecurity CRITICAL 5h Global vulnerability Information Technology / Cybersecurity CRITICAL 7h Global malware Energy and Utilities CRITICAL 8h Global ransomware Multiple sectors CRITICAL 8h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 11h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 11h Global phishing Multiple sectors HIGH 12h Global insider Cybersecurity Services CRITICAL 12h Global ransomware Multiple sectors (U.S. companies) CRITICAL 12h Global data_breach Government CRITICAL 5h Global ransomware Financial Services / Cybersecurity CRITICAL 5h Global vulnerability Information Technology / Cybersecurity CRITICAL 7h Global malware Energy and Utilities CRITICAL 8h Global ransomware Multiple sectors CRITICAL 8h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 11h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 11h Global phishing Multiple sectors HIGH 12h Global insider Cybersecurity Services CRITICAL 12h Global ransomware Multiple sectors (U.S. companies) CRITICAL 12h
Vulnerabilities

CVE-2022-23748

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Dante Discovery Process Control Vulnerability — Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverag
Published: Feb 6, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Dante Discovery Process Control Vulnerability — Dante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.

🤖 AI Executive Summary

CVE-2022-23748 is a critical DLL sideloading vulnerability in Audinate Dante Discovery's mDNSResponder.exe that allows local attackers to execute arbitrary code with high privileges. With a CVSS score of 9.0 and publicly available exploits, this poses an immediate threat to organizations using Dante audio networking solutions. Immediate patching is essential to prevent unauthorized code execution and potential lateral movement within networked audio infrastructure.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 17:38
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability primarily impacts Saudi organizations in broadcasting, media production, and large-scale event management sectors that rely on Dante audio networking. Government media entities (SMBC), Saudi entertainment venues, and professional audio installations are at risk. Additionally, organizations with integrated audio-visual systems in corporate headquarters, universities, and healthcare facilities using Dante Discovery for audio management face potential compromise. The vulnerability enables local privilege escalation and arbitrary code execution, which could lead to unauthorized access to sensitive audio streams, system compromise, and lateral movement within networked infrastructure.
🏢 Affected Saudi Sectors
Broadcasting and Media Government Media Entities Entertainment and Events Education (Universities) Healthcare Facilities Corporate Communications Professional Audio Production
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
1. IMMEDIATE ACTIONS:
- Identify all systems running Audinate Dante Discovery and mDNSResponder.exe
- Restrict local access to affected systems through access control lists
- Disable Dante Discovery service if not actively required
- Isolate affected systems from critical network segments

2. PATCHING GUIDANCE:
- Update Audinate Dante Discovery to version 4.1.0.5 or later
- Apply all available security patches from Audinate
- Test patches in non-production environment first
- Schedule patching during maintenance windows

3. COMPENSATING CONTROLS:
- Implement application whitelisting to prevent unauthorized DLL loading
- Monitor mDNSResponder.exe process execution and DLL loading behavior
- Restrict write permissions to Dante Discovery installation directories
- Implement file integrity monitoring on critical Dante binaries

4. DETECTION RULES:
- Alert on mDNSResponder.exe loading DLLs from unexpected locations
- Monitor for suspicious child processes spawned by mDNSResponder.exe
- Track modifications to Dante Discovery installation directories
- Log and alert on failed DLL loading attempts with error codes
🔧 خطوات المعالجة (العربية)
1. الإجراءات الفورية:
- تحديد جميع الأنظمة التي تقوم بتشغيل Audinate Dante Discovery و mDNSResponder.exe
- تقييد الوصول المحلي للأنظمة المتأثرة من خلال قوائم التحكم في الوصول
- تعطيل خدمة Dante Discovery إذا لم تكن مطلوبة بنشاط
- عزل الأنظمة المتأثرة عن أجزاء الشبكة الحرجة

2. إرشادات التصحيح:
- تحديث Audinate Dante Discovery إلى الإصدار 4.1.0.5 أو أحدث
- تطبيق جميع تصحيحات الأمان المتاحة من Audinate
- اختبار التصحيحات في بيئة غير الإنتاج أولاً
- جدولة التصحيح خلال نوافذ الصيانة

3. الضوابط البديلة:
- تنفيذ قائمة بيضاء للتطبيقات لمنع تحميل DLL غير المصرح به
- مراقبة تنفيذ عملية mDNSResponder.exe وسلوك تحميل DLL
- تقييد أذونات الكتابة على مجلدات تثبيت Dante Discovery
- تنفيذ مراقبة سلامة الملفات على ملفات Dante الحرجة

4. قواعد الكشف:
- التنبيه عند تحميل mDNSResponder.exe لـ DLLs من مواقع غير متوقعة
- مراقبة العمليات الفرعية المريبة التي تم إنشاؤها بواسطة mDNSResponder.exe
- تتبع التعديلات على مجلدات تثبيت Dante Discovery
- تسجيل والتنبيه على محاولات تحميل DLL الفاشلة برموز الخطأ
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies ECC 2024 A.8.1.1 - Asset Management ECC 2024 A.12.2.1 - Change Management ECC 2024 A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
ID.AM-1 - Asset Management PR.AC-1 - Access Control PR.PT-2 - Protective Technology DE.CM-8 - Vulnerability Scans
🟡 ISO 27001:2022
A.5.1 - Policies for Information Security A.8.1 - Asset Management A.12.2 - Change Management A.12.6 - Management of Technical Vulnerabilities and Exposures A.14.2 - Development and Change Management
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Audinate:Dante Discovery
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS11.74%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-02-27
Published 2025-02-06
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.