First published: Fri Aug 11 2023(Updated: )
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Killer | <34.22.1163 | |
Intel Proset\/wireless Wifi | <22.200 | |
Intel Uefi Firmware | <3.2.20.23023 | |
Intel Killer Wi-fi 6 Ax1650 | ||
Intel Killer Wi-fi 6e Ax1675 | ||
Intel Killer Wi-fi 6e Ax1690 | ||
Intel Wi-fi 6 Ax101 | ||
Intel Wi-fi 6 Ax200 | ||
Intel Wi-fi 6 Ax201 | ||
Intel Wi-fi 6 Ax203 | ||
Intel Wi-fi 6e Ax210 | ||
Intel Wi-fi 6e Ax211 | ||
Intel Wi-fi 6e Ax411 | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 | |
redhat/linux-firmware | <20230804 | 20230804 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-36351.
The severity of CVE-2022-36351 is medium with a CVSS score of 6.5.
The affected software products include Intel PROSet/Wireless WiFi and Killer WiFi software with specific versions.
An unauthenticated user can potentially enable denial of service via adjacent access.
You can find more information about CVE-2022-36351 in the Intel Security Advisory and Fedora Project announcements.