First published: Wed Nov 13 2024(Updated: )
Improper input validation for some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow a privileged user to potentially enable denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel PROSet/Wireless WiFi | <23.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33611 has been classified as a potentially critical vulnerability due to its ability to allow a privileged user to enable denial of service.
To fix CVE-2024-33611, update the Intel PROSet/Wireless WiFi software to version 23.60 or later.
CVE-2024-33611 affects users of Intel PROSet/Wireless WiFi software for Windows versions prior to 23.60.
CVE-2024-33611 is categorized as an improper input validation vulnerability.
CVE-2024-33611 requires local access to the system for exploitation.