First published: Fri Aug 11 2023(Updated: )
Intel PROSet/Wireless WiFi and Killer WiFi products could allow a local authenticated attacker to gain elevated privileges on the system, caused by protection mechanism failure. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/linux-firmware | <20230804 | 20230804 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP9 IF03 | |
IBM QRadar Incident Forensics | <=7.5 - 7.5.0 UP9 IF03 | |
Intel Killer Wi-Fi | <34.22.1163 | |
Intel Proset/Wireless WiFi | <22.200 | |
Intel UEFI Firmware | <3.2.20.23023 | |
Intel Wi-Fi 6E AX201 Firmware | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46329 is a vulnerability in Intel PROSet/Wireless WiFi software that allows a privileged user to potentially enable escalation of privilege via local access.
The severity of CVE-2022-46329 is high with a CVSS score of 6.7.
The Intel Killer, Intel Proset/Wireless Wifi, and Intel Uefi Firmware are affected by CVE-2022-46329.
CVE-2022-46329 can be exploited by a privileged user with local access.
You can find more information about CVE-2022-46329 on the Intel security advisory and the Fedora Project mailing list.