Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Intel
Subscribe
|
Dual Band Wireless-ac 3165
Subscribe
Dual Band Wireless-ac 3168
Subscribe
Dual Band Wireless-ac 8260
Subscribe
Dual Band Wireless-ac 8265
Subscribe
Killer
Subscribe
Killer Wireless-ac 1550
Subscribe
Proset\/wireless Wifi
Subscribe
Uefi Firmware
Subscribe
Wireless-ac 9260
Subscribe
Wireless-ac 9461
Subscribe
Wireless-ac 9462
Subscribe
Wireless-ac 9560
Subscribe
Wireless 7265 \(rev D\)
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3596-1 | firmware-nonfree security update |
EUVD |
EUVD-2022-40679 | Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-02-13T16:32:56.803Z
Reserved: 2022-08-10T03:00:25.306Z
Link: CVE-2022-38076
Updated: 2024-08-03T10:45:52.414Z
Status : Modified
Published: 2023-08-11T03:15:13.843
Modified: 2024-11-21T07:15:43.863
Link: CVE-2022-38076
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD