First published: Fri Aug 11 2023(Updated: )
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Killer | <34.22.1163 | |
Intel Proset\/wireless Wifi | <22.200 | |
Intel Uefi Firmware | <3.2.20.23023 | |
Intel Dual Band Wireless-ac 3165 | ||
Intel Dual Band Wireless-ac 3168 | ||
Intel Dual Band Wireless-ac 8260 | ||
Intel Dual Band Wireless-ac 8265 | ||
Intel Killer Wireless-ac 1550 | ||
Intel Wireless-ac 9260 | ||
Intel Wireless-ac 9461 | ||
Intel Wireless-ac 9462 | ||
Intel Wireless-ac 9560 | ||
Intel Wireless 7265 \(rev D\) | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 | |
redhat/linux-firmware | <20230804 | 20230804 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38076 is a vulnerability that involves improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software, which may allow an authenticated user to potentially enable escalation of privilege via local access.
The Intel(R) PROSet/Wireless WiFi software up to version 22.200, Intel(R) Killer(TM) WiFi software up to version 34.22.1163, and Intel Uefi Firmware up to version 3.2.20.23023 are affected by CVE-2022-38076.
CVE-2022-38076 has a severity rating of 7.8 (High).
An authenticated user can potentially enable escalation of privilege via local access through the CVE-2022-38076 vulnerability.
More information about CVE-2022-38076 can be found on the Intel Security Center advisory page and the Fedora Project mailing list.