Description
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3596-1 | firmware-nonfree security update |
EUVD |
EUVD-2022-40679 | Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access. |
References
History
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Intel
Subscribe
Dual Band Wireless-ac 3165
Subscribe
Dual Band Wireless-ac 3168
Subscribe
Dual Band Wireless-ac 8260
Subscribe
Dual Band Wireless-ac 8265
Subscribe
Killer
Subscribe
Killer Wireless-ac 1550
Subscribe
Proset\/wireless Wifi
Subscribe
Uefi Firmware
Subscribe
Wireless-ac 9260
Subscribe
Wireless-ac 9461
Subscribe
Wireless-ac 9462
Subscribe
Wireless-ac 9560
Subscribe
Wireless 7265 \(rev D\)
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-02-13T16:32:56.803Z
Reserved: 2022-08-10T03:00:25.306Z
Link: CVE-2022-38076
Updated: 2024-08-03T10:45:52.414Z
Status : Modified
Published: 2023-08-11T03:15:13.843
Modified: 2024-11-21T07:15:43.863
Link: CVE-2022-38076
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD