First published: Wed Feb 14 2024(Updated: )
Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Intel Killer Wi-Fi | <3.1423.712 | |
Intel PROSet/Wireless | <22.240 | |
Any of | ||
Intel Killer Wi-Fi 6 AX1650 firmware | ||
Intel Killer Wi-Fi 6E AX1675 Firmware | ||
Intel Killer Wi-Fi 6E AX1690i/s | ||
Intel PROSet Wi-Fi 6 AX200 | ||
Intel Wi-Fi 6E AX201 Firmware | ||
Intel Wi-Fi 6E AX210 firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32644 is considered a high severity vulnerability due to its potential to enable denial of service by an unauthenticated user.
To fix CVE-2023-32644, update the Intel PROSet/Wireless and Intel Killer Wi-Fi software to versions higher than 22.240.
CVE-2023-32644 affects Intel PROSet/Wireless and Intel Killer Wi-Fi software versions before 22.240.
Yes, systems running the vulnerable versions of Intel wireless software could be exploited to enable denial of service.
As of now, Intel has not provided any specific workarounds for CVE-2023-32644, so updating the software is the recommended action.