First published: Thu Aug 18 2022(Updated: )
Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Wireless-ac 9560 Firmware | <22.120 | |
Intel Wireless-ac 9560 | ||
Intel Wireless-ac 9462 Firmware | <22.120 | |
Intel Wireless-ac 9462 | ||
Intel Wireless-ac 9461 Firmware | <22.120 | |
Intel Wireless-ac 9461 | ||
Intel Killer Ac 1550 Firmware | <3.1122.1105 | |
Intel Killer Ac 1550 | ||
Intel Dual Band Wireless-ac 8260 Firmware | <22.120 | |
Intel Dual Band Wireless-ac 8260 | ||
Intel Dual Band Wireless-ac 8265 Firmware | <22.120 | |
Intel Dual Band Wireless-ac 8265 | ||
Intel Wireless-ac 9260 Firmware | <22.120 | |
Intel Wireless-ac 9260 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-21181.
The severity of CVE-2022-21181 is high with a severity value of 7.8.
The following products are affected: Intel Wireless-ac 9560 Firmware (up to version 22.120), Intel Wireless-ac 9462 Firmware (up to version 22.120), Intel Wireless-ac 9461 Firmware (up to version 22.120), Intel Killer Ac 1550 Firmware (up to version 3.1122.1105), Intel Dual Band Wireless-ac 8260 Firmware (up to version 22.120), Intel Dual Band Wireless-ac 8265 Firmware (up to version 22.120), and Intel Wireless-ac 9260 Firmware (up to version 22.120).
The vulnerability may allow a privileged user to potentially enable escalation of privilege via local access.
You can find more information about CVE-2022-21181 on the Debian LTS Advisory (https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html) and Intel Security Center Advisory (https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html) websites.