First published: Wed Nov 13 2024(Updated: )
Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel PROSet/Wireless | <23.40 | |
Intel Killer WiFi | <23.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23198 is considered a moderate severity vulnerability due to its potential to enable denial of service.
To remediate CVE-2024-23198, update your Intel PROSet/Wireless Software or Intel Killer Wi-Fi to version 23.40 or later.
CVE-2024-23198 affects users of Intel PROSet/Wireless Software and Intel Killer Wi-Fi products prior to version 23.40.
CVE-2024-23198 can be exploited by an unauthenticated user to cause a denial of service through adjacent access.
Using affected versions of Intel software is risky as they are vulnerable to denial of service attacks until updated to version 23.40 or later.