Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 06:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html - | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html - Patch, Vendor Advisory |
01 Apr 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-08-18 20:15
Updated : 2024-11-21 06:44
NVD link : CVE-2022-21181
Mitre link : CVE-2022-21181
CVE.ORG link : CVE-2022-21181
JSON object : View
Products Affected
intel
- wireless-ac_9462_firmware
- wireless-ac_9461
- wireless-ac_9560_firmware
- wireless-ac_9260
- dual_band_wireless-ac_8260
- dual_band_wireless-ac_8265
- killer_ac_1550_firmware
- dual_band_wireless-ac_8260_firmware
- wireless-ac_9260_firmware
- dual_band_wireless-ac_8265_firmware
- killer_ac_1550
- wireless-ac_9461_firmware
- wireless-ac_9462
- wireless-ac_9560
CWE
CWE-20
Improper Input Validation