First published: Fri Nov 13 2020(Updated: )
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Proset/Wireless WiFi | <21.110 | |
Intel PROSet/Wireless Software for Intel Dual Band Wireless-AC 3165 | ||
Intel Dual Band Wireless-AC 3168 Firmware | ||
Intel Dual Band Wireless-AC 8260 Firmware | ||
Intel Dual Band Wireless-AC 8265 Firmware | ||
Intel PROSet Wi-Fi 6 AX200 | ||
Intel Wi-Fi 6E AX201 Firmware | ||
Intel Wireless-AC 9260 Firmware | ||
Intel Wireless-AC 9461 | ||
Intel Wireless-AC 9462 | ||
Intel Wireless-AC 9560 | ||
Intel Wireless 7265 (rev D) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12313 has been classified with a high severity level due to potential privilege escalation risks.
CVE-2020-12313 affects Intel PROSet/Wireless WiFi products prior to version 21.110.
To fix CVE-2020-12313, upgrade to Intel PROSet/Wireless WiFi version 21.110 or later.
CVE-2020-12313 requires adjacent access, meaning an unauthenticated user must be physically nearby to exploit the vulnerability.
CVE-2020-12313 could enable attackers to escalate privileges on vulnerable systems.