Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.0 |
29 Oct 2024, 15:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Intel killer Wi-fi 6e Ax1690
Intel wi-fi 6e Ax411 Intel Intel killer Intel proset Wi-fi 6e Ax210 Intel killer Wi-fi 6e Ax1675 Intel proset\/wireless Intel wi-fi 6e Ax211 |
|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html - Vendor Advisory | |
CPE | cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:* cpe:2.3:a:intel:proset\/wireless:*:*:*:*:*:*:*:* cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:* cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:* cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:* cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:* cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
CWE | NVD-CWE-noinfo |
14 Feb 2024, 15:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-14 14:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-25951
Mitre link : CVE-2023-25951
CVE.ORG link : CVE-2023-25951
JSON object : View
Products Affected
intel
- killer_wi-fi_6e_ax1690
- proset\/wireless
- wi-fi_6e_ax211
- wi-fi_6e_ax411
- proset_wi-fi_6e_ax210
- killer_wi-fi_6e_ax1675
- killer
CWE