First published: Fri Aug 11 2023(Updated: )
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/linux-firmware | <20230804 | 20230804 |
Intel Killer Wi-Fi | <34.22.1163 | |
Intel Proset/Wireless WiFi | <22.200 | |
Intel UEFI Firmware | <3.2.20.23023 | |
Intel Killer Wi-Fi 6 AX1650 | ||
Intel Killer Wi-Fi 6E AX1675 | ||
Intel Killer Wi-Fi 6E AX1690 | ||
Intel Wi-Fi 6 AX101 | ||
Intel Wi-Fi 6E AX200 | ||
Intel Wi-Fi 6E AX201 Firmware | ||
Intel Wi-Fi 6 AX203 | ||
Intel Wi-Fi 6E AX210 firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-36351.
The severity of CVE-2022-36351 is medium with a CVSS score of 6.5.
The affected software products include Intel PROSet/Wireless WiFi and Killer WiFi software with specific versions.
An unauthenticated user can potentially enable denial of service via adjacent access.
You can find more information about CVE-2022-36351 in the Intel Security Advisory and Fedora Project announcements.