First published: Wed Nov 13 2024(Updated: )
Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi wireless products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel PROSet/Wireless | <23.40 | |
Intel Killer WiFi | <23.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28049 has a medium severity rating due to the potential for denial of service.
To mitigate CVE-2024-28049, update the Intel PROSet/Wireless Software or Intel Killer Wi-Fi to version 23.40 or later.
CVE-2024-28049 affects Intel PROSet/Wireless Software and Intel Killer Wi-Fi products prior to version 23.40.
CVE-2024-28049 is an improper input validation vulnerability that can lead to denial of service.
An unauthenticated user within adjacent access can exploit CVE-2024-28049 to cause a denial of service.