First published: Wed Feb 12 2025(Updated: )
Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel PROSet/Wireless WiFi | <23.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-41166 is considered high due to its potential to enable denial of service.
To fix CVE-2024-41166, update the Intel PROSet/Wireless WiFi and Killer WiFi software to version 23.80 or later.
CVE-2024-41166 affects Intel PROSet/Wireless WiFi and Killer WiFi software for Windows prior to version 23.80.
CVE-2024-41166 requires adjacent access, meaning it cannot be exploited remotely without physical proximity.
CVE-2024-41166 is classified as a stack-based buffer overflow vulnerability.