First published: Wed Feb 14 2024(Updated: )
Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Intel Killer Wi-Fi | <3.1423.712 | |
Intel PROSet/Wireless | <22.240 | |
Any of | ||
Intel Killer Wi-Fi 6E AX1675 Firmware | ||
Intel Killer Wi-Fi 6E AX1690i/s | ||
Intel ProSet Wi-Fi 6E AX210 Firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32651 has been classified with a medium severity rating due to potential denial of service vulnerabilities.
To fix CVE-2023-32651, upgrade Intel PROSet/Wireless and Intel Killer Wi-Fi software to versions after 22.240.
CVE-2023-32651 affects users of Intel PROSet/Wireless and Intel Killer Wi-Fi software versions prior to 22.240.
CVE-2023-32651 is an improper validation vulnerability that may allow unauthorized access leading to denial of service.
CVE-2023-32651 requires adjacent access, meaning it cannot be directly exploited remotely.