PatchSiren cyber security CVE debrief
CVE-2022-23748 Audinate CVE debrief
CVE-2022-23748 is a known-exploited vulnerability affecting Audinate Dante Discovery and listed by CISA in the Known Exploited Vulnerabilities catalog on 2025-02-06. The supplied corpus does not include the full technical advisory text, but the KEV listing alone means defenders should treat this as a high-priority remediation item and follow the vendor’s mitigation guidance referenced by CISA. If mitigations are not available, CISA’s guidance is to discontinue use of the product.
- Vendor
- Audinate
- Product
- Dante Discovery
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-02-06
- Original CVE updated
- 2025-02-06
- Advisory published
- 2025-02-06
- Advisory updated
- 2025-02-06
Who should care
Organizations that deploy Audinate Dante Discovery, especially endpoint, audio-network, and infrastructure administrators responsible for discovery or process-control components.
Technical summary
The supplied source corpus identifies the issue as a "Dante Discovery Process Control Vulnerability" in Audinate Dante Discovery and confirms it is cataloged by CISA as known exploited. No additional exploit mechanics, affected versions, or impact details are provided in the supplied materials. Operationally, the key defensive signal is the KEV listing, which elevates urgency regardless of the limited technical detail available here.
Defensive priority
High. CISA KEV inclusion indicates confirmed exploitation risk, so remediation should be scheduled immediately using vendor guidance or product discontinuation if no mitigation exists.
Recommended defensive actions
- Review the vendor advisory referenced in CISA’s KEV notes for mitigation or replacement steps.
- Apply any vendor-recommended mitigations as soon as possible.
- If mitigations are unavailable, discontinue use of Audinate Dante Discovery per CISA guidance.
- Verify whether Dante Discovery is deployed anywhere in your environment, including unmanaged or forgotten endpoints.
- Track exposure until remediation is complete and confirm the affected component is no longer reachable or in use.
Evidence notes
This debrief is based only on the supplied CISA KEV metadata and the official reference links included in the corpus. The corpus confirms the CVE ID, product name, KEV status, and CISA’s remediation guidance, but does not include the full vendor advisory text or detailed NVD narrative. Timing context uses the supplied CVE/KEV dates: published/modified 2025-02-06 and KEV due date 2025-02-27.
Official resources
-
CVE-2022-23748 CVE record
CVE.org
-
CVE-2022-23748 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
Public, defensive-only summary derived from official references in the supplied corpus. No exploit instructions or weaponization details included.