First published: Wed Feb 14 2024(Updated: )
Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access..
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Intel Killer Wi-Fi | <3.1423.712 | |
Intel PROSet/Wireless | <22.240 | |
Any of | ||
Intel Killer Wi-Fi 6 AX1650 | ||
Intel Killer Wi-Fi 6E AX1675 | ||
Intel Killer Wi-Fi 6E AX1690 | ||
Intel Wi-Fi 6E AX200 | ||
Intel Wi-Fi 6E AX201 Firmware | ||
Intel Wi-Fi 6E AX210 firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33875 has a moderate severity level due to improper access control that can lead to denial of service.
To fix CVE-2023-33875, update your Intel PROSet/Wireless and Intel Killer Wi-Fi software to version 22.240 or later.
CVE-2023-33875 affects versions of Intel PROSet/Wireless and Intel Killer Wi-Fi software prior to version 22.240.
CVE-2023-33875 is classified as an improper access control vulnerability.
No, CVE-2023-33875 requires local access for exploitation.