First published: Wed Feb 14 2024(Updated: )
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Intel Killer Wi-Fi | <3.1423.712 | |
Intel PROSet/Wireless | <22.240 | |
Any of | ||
Intel Killer Wi-Fi 6 AX1650 firmware | ||
Intel Killer Wi-Fi 6E AX1675 Firmware | ||
Intel Killer Wi-Fi 6E AX1690i/s | ||
Intel PROSet Wi-Fi 6 AX200 | ||
Intel Wi-Fi 6E AX201 Firmware | ||
Intel Wi-Fi 6E AX210 firmware | ||
Intel ax211 | ||
Intel Wi-Fi 6E AX411 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34983 is classified as medium due to the potential for denial of service when exploited.
To fix CVE-2023-34983, update the Intel PROSet/Wireless and Intel Killer Wi-Fi software to version 22.240 or later.
CVE-2023-34983 affects Intel PROSet/Wireless and Intel Killer Wi-Fi software versions prior to 22.240.
An attacker can potentially enable a denial of service via adjacent access using CVE-2023-34983.
Currently, there is no documented workaround for CVE-2023-34983 besides applying the recommended software update.