First published: Wed Feb 14 2024(Updated: )
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Intel Killer Wi-Fi | <3.1423.712 | |
Intel PROSet/Wireless | <22.240 | |
Any of | ||
Intel Killer Wi-Fi 6E AX1675 Firmware | ||
Intel Killer Wi-Fi 6E AX1690i/s | ||
Intel ProSet Wi-Fi 6E AX210 Firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25951 is considered to have a moderate severity level due to the potential for privilege escalation.
To fix CVE-2023-25951, update your Intel PROSet/Wireless and Intel Killer Wi-Fi software to version 22.240 or later.
CVE-2023-25951 affects users of Intel PROSet/Wireless and Intel Killer Wi-Fi software versions prior to 22.240.
An attacker exploiting CVE-2023-25951 could potentially escalate privileges on the affected system.
Yes, local access is required to exploit CVE-2023-25951.