First published: Thu Feb 16 2023(Updated: )
Protection mechanism failure in the Intel(R) Ethernet 500 Series Controller drivers for VMware before version 1.10.0.1 may allow an authenticated user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ixgben | <1.10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36797 has a severity rating that indicates a potential denial of service vulnerability due to a protection mechanism failure.
To fix CVE-2022-36797, update the Intel Ethernet 500 Series Controller drivers for VMware to version 1.10.0.1 or later.
Authenticated users with access to systems running affected versions of the Intel Ethernet 500 Series Controller drivers for VMware may be impacted by CVE-2022-36797.
CVE-2022-36797 is classified as a protection mechanism failure vulnerability.
Yes, CVE-2022-36797 may allow an authenticated user to potentially enable denial of service exploits via local access.