First published: Fri Aug 11 2023(Updated: )
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/linux-firmware | <20230804 | 20230804 |
Intel Killer Wi-Fi | <34.22.1163 | |
Intel Proset/Wireless WiFi | <22.200 | |
Intel UEFI Firmware | <3.2.20.23023 | |
Intel PROSet/Wireless Software for Intel Dual Band Wireless-AC 3165 | ||
Intel Dual Band Wireless-AC 3168 Firmware | ||
Intel Dual Band Wireless-AC 8260 Firmware | ||
Intel Dual Band Wireless-AC 8265 Firmware | ||
Intel Killer Wireless-AC 1550 | ||
Intel Wireless-AC 9260 Firmware | ||
Intel Wireless-AC 9461 | ||
Intel Wireless-AC 9462 | ||
Intel Wireless-AC 9560 | ||
Intel Wireless 7265 (rev D) | ||
Fedora | =37 | |
Fedora | =38 | |
Fedora | =39 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38076 is a vulnerability that involves improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software, which may allow an authenticated user to potentially enable escalation of privilege via local access.
The Intel(R) PROSet/Wireless WiFi software up to version 22.200, Intel(R) Killer(TM) WiFi software up to version 34.22.1163, and Intel Uefi Firmware up to version 3.2.20.23023 are affected by CVE-2022-38076.
CVE-2022-38076 has a severity rating of 7.8 (High).
An authenticated user can potentially enable escalation of privilege via local access through the CVE-2022-38076 vulnerability.
More information about CVE-2022-38076 can be found on the Intel Security Center advisory page and the Fedora Project mailing list.