Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-38076


Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.


Published

2023-08-11T03:15:13.843

Last Modified

2024-11-21T07:15:43.863

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.8 (LOW)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application intel killer < 34.22.1163 Yes
Application intel proset\/wireless_wifi < 22.200 Yes
Application intel uefi_firmware < 3.2.20.23023 Yes
Hardware intel dual_band_wireless-ac_3165 - No
Hardware intel dual_band_wireless-ac_3168 - No
Hardware intel dual_band_wireless-ac_8260 - No
Hardware intel dual_band_wireless-ac_8265 - No
Hardware intel killer_wireless-ac_1550 - No
Hardware intel wireless-ac_9260 - No
Hardware intel wireless-ac_9461 - No
Hardware intel wireless-ac_9462 - No
Hardware intel wireless-ac_9560 - No
Hardware intel wireless_7265_\(rev_d\) - No
Operating System fedoraproject fedora 37 Yes
Operating System fedoraproject fedora 38 Yes
Operating System fedoraproject fedora 39 Yes
Operating System debian debian_linux 10.0 Yes

References