Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html - | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html - Patch, Vendor Advisory |
01 Apr 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-08-18 20:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23223
Mitre link : CVE-2021-23223
CVE.ORG link : CVE-2021-23223
JSON object : View
Products Affected
intel
- wi-fi_6e_ax411
- killer_wi-fi_6e_ax1690
- wi-fi_6e_ax411_firmware
- proset_wi-fi_6e_ax210_firmware
- proset_wi-fi_6e_ax210
- wi-fi_6e_ax211_firmware
- wi-fi_6e_ax211
- killer_wi-fi_6e_ax1675_firmware
- killer_wi-fi_6e_ax1690_firmware
- killer_wi-fi_6e_ax1675
CWE
CWE-665
Improper Initialization