First published: Wed Feb 14 2024(Updated: )
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Intel Killer Wi-Fi | <3.1423.712 | |
Intel PROSet/Wireless | <22.240 | |
Any of | ||
Intel Killer Wi-Fi 6E AX1675 Firmware | ||
Intel Killer Wi-Fi 6E AX1690i/s | ||
Intel ProSet Wi-Fi 6E AX210 Firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28374 has been categorized as a potentially serious vulnerability due to the risk of denial of service.
To mitigate CVE-2023-28374, update Intel PROSet/Wireless and Intel Killer Wi-Fi software to versions newer than 22.240.
CVE-2023-28374 affects users with Intel PROSet/Wireless and Intel Killer Wi-Fi software versions prior to 22.240.
Attackers can potentially enable denial of service through adjacent access by exploiting CVE-2023-28374.
CVE-2023-28374 requires adjacent access, meaning it is not remotely exploitable without physical proximity.