All the vulnerabilites related to intel - killer_wi-fi_6e_ax1690
cve-2023-32644
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 19:51
Summary
Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.573Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32644",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T19:51:22.903995Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T19:51:38.201Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-693",
              "description": "Protection mechanism failure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:59.194Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32644",
    "datePublished": "2024-02-14T13:37:59.194Z",
    "dateReserved": "2023-06-15T03:00:04.962Z",
    "dateUpdated": "2024-08-14T19:51:38.201Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33875
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-07 18:32
Summary
Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access..
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.404Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33875",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T18:19:25.535210Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:32:49.803Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access.."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:54.222Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-33875",
    "datePublished": "2024-02-14T13:37:54.222Z",
    "dateReserved": "2023-06-15T03:00:04.933Z",
    "dateUpdated": "2024-08-07T18:32:49.803Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-26586
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 19:55
Summary
Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:54.275Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26586",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T19:55:06.161807Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T19:55:19.101Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-248",
              "description": "Uncaught exception",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:59.856Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26586",
    "datePublished": "2024-02-14T13:37:59.856Z",
    "dateReserved": "2023-03-04T04:00:03.425Z",
    "dateUpdated": "2024-08-14T19:55:19.101Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23179
Vulnerability from cvelistv5
Published
2022-08-18 19:44
Modified
2024-08-03 19:05
Severity ?
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:55.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:44:27",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-23179",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23179",
    "datePublished": "2022-08-18T19:44:27",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T19:05:55.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26254
Vulnerability from cvelistv5
Published
2022-08-18 19:39
Modified
2024-08-03 20:19
Severity ?
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.386Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:39:46",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-26254",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-26254",
    "datePublished": "2022-08-18T19:39:46",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T20:19:20.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23223
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 19:05
Severity ?
Summary
Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:55.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23223",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T19:05:55.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23188
Vulnerability from cvelistv5
Published
2022-08-18 19:43
Modified
2024-08-03 19:05
Severity ?
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:53.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:43:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-23188",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23188",
    "datePublished": "2022-08-18T19:43:19",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T19:05:53.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26950
Vulnerability from cvelistv5
Published
2022-08-18 19:44
Modified
2024-08-03 20:33
Severity ?
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:33:41.305Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:44:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-26950",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-26950",
    "datePublished": "2022-08-18T19:44:19",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T20:33:41.305Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26047
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 04:56
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T04:56:37.498Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T17:46:32.386Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-26047",
    "datePublished": "2022-11-11T15:49:13.792Z",
    "dateReserved": "2022-04-05T15:11:17.482Z",
    "dateUpdated": "2024-08-03T04:56:37.498Z",
    "requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-36351
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-02 14:10
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:00:04.535Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-36351",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:06:11.743007Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:10:17.905Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:54.506Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-36351",
    "datePublished": "2023-08-11T02:36:54.506Z",
    "dateReserved": "2022-08-10T03:00:23.005Z",
    "dateUpdated": "2024-10-02T14:10:17.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-25951
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 18:46
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:39:06.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "proset\\/wireless",
            "vendor": "intel",
            "versions": [
              {
                "lessThan": "22.240",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:intel:killer_wifi_software:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "killer_wifi_software",
            "vendor": "intel",
            "versions": [
              {
                "lessThan": "22.240",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-25951",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T18:40:19.267708Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T18:46:12.449Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:55.865Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-25951",
    "datePublished": "2024-02-14T13:37:55.865Z",
    "dateReserved": "2023-03-04T04:00:03.474Z",
    "dateUpdated": "2024-08-14T18:46:12.449Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32642
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-16 19:46
Summary
Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.311Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32642",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:46:05.587325Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-16T19:46:15.081Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-1076",
              "description": "Insufficient adherence to expected conventions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:56.450Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32642",
    "datePublished": "2024-02-14T13:37:56.450Z",
    "dateReserved": "2023-06-17T03:00:02.847Z",
    "dateUpdated": "2024-08-16T19:46:15.081Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28720
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-16 19:46
Summary
Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access..
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T13:43:23.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-28720",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:46:29.980512Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-16T19:46:41.176Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-665",
              "description": "Improper initialization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:55.300Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-28720",
    "datePublished": "2024-02-14T13:37:55.300Z",
    "dateReserved": "2023-06-15T03:00:04.950Z",
    "dateUpdated": "2024-08-16T19:46:41.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-44545
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-04 04:25
Severity ?
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T04:25:16.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-44545",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-04T04:25:16.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-34983
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-07 20:11
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:17:04.229Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34983",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T20:11:21.146195Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:11:35.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:57.071Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-34983",
    "datePublished": "2024-02-14T13:37:57.071Z",
    "dateReserved": "2023-06-15T03:00:04.943Z",
    "dateUpdated": "2024-08-07T20:11:35.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-33847
Vulnerability from cvelistv5
Published
2022-08-18 19:43
Modified
2024-08-04 00:05
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:05:51.076Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:43:51",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-33847",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-33847",
    "datePublished": "2022-08-18T19:43:51",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-04T00:05:51.076Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21140
Vulnerability from cvelistv5
Published
2022-08-18 19:43
Modified
2024-08-03 02:31
Severity ?
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:31:59.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:43:39",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2022-21140",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-21140",
    "datePublished": "2022-08-18T19:43:39",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T02:31:59.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28374
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-15 19:10
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:38:25.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-28374",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T19:10:21.336051Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T19:10:34.778Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:54.759Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-28374",
    "datePublished": "2024-02-14T13:37:54.759Z",
    "dateReserved": "2023-06-15T03:00:04.913Z",
    "dateUpdated": "2024-08-15T19:10:34.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-37409
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-04 01:16
Severity ?
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:16:04.147Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-37409",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-04T01:16:04.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26257
Vulnerability from cvelistv5
Published
2022-08-18 19:44
Modified
2024-08-03 20:19
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.390Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:44:07",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-26257",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-26257",
    "datePublished": "2022-08-18T19:44:07",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T20:19:20.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23168
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 19:05
Severity ?
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:53.894Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23168",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T19:05:53.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32651
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 18:39
Summary
Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.297Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32651",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T18:38:37.285018Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T18:39:09.688Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-1287",
              "description": "Improper validation of specified type of input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:58.475Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32651",
    "datePublished": "2024-02-14T13:37:58.475Z",
    "dateReserved": "2023-06-15T03:00:04.926Z",
    "dateUpdated": "2024-08-14T18:39:09.688Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:06
Summary
Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access..



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access.."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-33875",
  "lastModified": "2024-11-21T08:06:07.170",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:56.020",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una inicializaci\u00f3n inapropiada de algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local."
    }
  ],
  "id": "CVE-2021-23223",
  "lastModified": "2024-11-21T05:51:24.070",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.273",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:51
Summary
Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una excepci\u00f3n no detectada para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-26586",
  "lastModified": "2024-11-21T07:51:48.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:44.547",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-248"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:09
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, pueden permitir que un usuario autenticado habilite potencialmente una escalada de privilegios por medio del acceso local."
    }
  ],
  "id": "CVE-2021-33847",
  "lastModified": "2024-11-21T06:09:41.313",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.587",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:55
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites de algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio por medio del acceso local."
    }
  ],
  "id": "CVE-2021-26254",
  "lastModified": "2024-11-21T05:55:59.323",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.320",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:43
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66434F2B-0ED8-4364-9281-8A438B8D337D",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario privilegiado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local."
    }
  ],
  "id": "CVE-2022-21140",
  "lastModified": "2024-11-21T06:43:58.517",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.827",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66434F2B-0ED8-4364-9281-8A438B8D337D",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio por medio de acceso adyacente."
    }
  ],
  "id": "CVE-2021-23168",
  "lastModified": "2024-11-21T05:51:18.990",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.133",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:55
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, pueden permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio por acceso local."
    }
  ],
  "id": "CVE-2021-26257",
  "lastModified": "2024-11-21T05:55:59.567",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.367",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:54
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-28374",
  "lastModified": "2024-11-21T07:54:56.870",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:47.507",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:57
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120 puede permitir a un usuario autenticado habilitar potencialmente la denegaci\u00f3n de servicio por acceso local."
    }
  ],
  "id": "CVE-2021-26950",
  "lastModified": "2024-11-21T05:57:06.300",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.410",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:31
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio por medio de un acceso adyacente."
    }
  ],
  "id": "CVE-2021-44545",
  "lastModified": "2024-11-21T06:31:12.197",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.733",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:03
Summary
Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n inadecuada del tipo espec\u00edfico de entrada para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-32651",
  "lastModified": "2024-11-21T08:03:46.520",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:54.883",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1287"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:07
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-34983",
  "lastModified": "2024-11-21T08:07:46.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:57.663",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, puede permitir que un usuario privilegiado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local."
    }
  ],
  "id": "CVE-2021-23179",
  "lastModified": "2024-11-21T05:51:20.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.183",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66434F2B-0ED8-4364-9281-8A438B8D337D",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario autenticado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local."
    }
  ],
  "id": "CVE-2021-23188",
  "lastModified": "2024-11-21T05:51:20.787",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.227",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:55
Summary
Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access..



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.."
    },
    {
      "lang": "es",
      "value": "La inicializaci\u00f3n incorrecta de algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-28720",
  "lastModified": "2024-11-21T07:55:52.187",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:48.273",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:03
Summary
Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La falla del mecanismo de protecci\u00f3n para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-32644",
  "lastModified": "2024-11-21T08:03:45.713",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:53.043",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-693"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:50
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-25951",
  "lastModified": "2024-11-21T07:50:30.337",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:44.040",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:15
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local."
    }
  ],
  "id": "CVE-2021-37409",
  "lastModified": "2024-11-21T06:15:06.103",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.633",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:53
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel killer_wifi_software *
intel proset\/wireless_wifi *
intel uefi_wifi_driver *
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel killer_wi-fi_6e_ax1690_firmware -
intel killer_wi-fi_6e_ax1690 -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -
intel wi-fi_6_ax210_firmware -
intel wi-fi_6_ax210 -
intel wi-fi_6_ax211_firmware -
intel wi-fi_6_ax211 -
intel wi-fi_6_ax411_firmware -
intel wi-fi_6_ax411 -
intel converged_security_and_manageability_engine *
intel core_i3-12100_firmware -
intel core_i3-12100f_firmware -
intel core_i3-12100t_firmware -
intel core_i3-1210u_firmware -
intel core_i3-1215u_firmware -
intel core_i3-1220p_firmware -
intel core_i3-12300_firmware -
intel core_i3-12300t_firmware -
intel core_i5-1230u_firmware -
intel core_i5-1235u_firmware -
intel core_i5-12400_firmware -
intel core_i5-12400f_firmware -
intel core_i5-12400t_firmware -
intel core_i5-1240p_firmware -
intel core_i5-1240u_firmware -
intel core_i5-12450h_firmware -
intel core_i5-12450hx_firmware -
intel core_i5-1245u_firmware -
intel core_i5-12500_firmware -
intel core_i5-12500h_firmware -
intel core_i5-12500t_firmware -
intel core_i5-1250p_firmware -
intel core_i5-12600_firmware -
intel core_i5-12600h_firmware -
intel core_i5-12600hx_firmware -
intel core_i5-12600k_firmware -
intel core_i5-12600kf_firmware -
intel core_i5-12600t_firmware -
intel core_i7-1250u_firmware -
intel core_i7-1255u_firmware -
intel core_i7-1260p_firmware -
intel core_i7-1260u_firmware -
intel core_i7-12650h_firmware -
intel core_i7-12650hx_firmware -
intel core_i7-1265u_firmware -
intel core_i7-12700_firmware -
intel core_i7-12700f_firmware -
intel core_i7-12700h_firmware -
intel core_i7-12700k_firmware -
intel core_i7-12700kf_firmware -
intel core_i7-12700t_firmware -
intel core_i7-1270p_firmware -
intel core_i7-12800h_firmware -
intel core_i7-12800hx_firmware -
intel core_i7-1280p_firmware -
intel core_i7-12850hx_firmware -
intel core_i9-12900_firmware -
intel core_i9-12900f_firmware -
intel core_i9-12900h_firmware -
intel core_i9-12900hk_firmware -
intel core_i9-12900hx_firmware -
intel core_i9-12900k_firmware -
intel core_i9-12900kf_firmware -
intel core_i9-12900t_firmware -
intel core_i9-12950hx_firmware -
intel wi-fi_6e_ax210 -
intel wi-fi_6e_ax211 -
intel converged_security_and_manageability_engine *
intel core_i3-12100_firmware -
intel core_i3-12100f_firmware -
intel core_i3-12100t_firmware -
intel core_i3-1210u_firmware -
intel core_i3-1215u_firmware -
intel core_i3-1220p_firmware -
intel core_i3-12300_firmware -
intel core_i3-12300t_firmware -
intel core_i5-1230u_firmware -
intel core_i5-1235u_firmware -
intel core_i5-12400_firmware -
intel core_i5-12400f_firmware -
intel core_i5-12400t_firmware -
intel core_i5-1240p_firmware -
intel core_i5-1240u_firmware -
intel core_i5-12450h_firmware -
intel core_i5-12450hx_firmware -
intel core_i5-1245u_firmware -
intel core_i5-12500_firmware -
intel core_i5-12500h_firmware -
intel core_i5-12500t_firmware -
intel core_i5-1250p_firmware -
intel core_i5-12600_firmware -
intel core_i5-12600h_firmware -
intel core_i5-12600hx_firmware -
intel core_i5-12600k_firmware -
intel core_i5-12600kf_firmware -
intel core_i5-12600t_firmware -
intel core_i7-1250u_firmware -
intel core_i7-1255u_firmware -
intel core_i7-1260p_firmware -
intel core_i7-1260u_firmware -
intel core_i7-12650h_firmware -
intel core_i7-12650hx_firmware -
intel core_i7-1265u_firmware -
intel core_i7-12700_firmware -
intel core_i7-12700f_firmware -
intel core_i7-12700h_firmware -
intel core_i7-12700k_firmware -
intel core_i7-12700kf_firmware -
intel core_i7-12700t_firmware -
intel core_i7-1270p_firmware -
intel core_i7-12800h_firmware -
intel core_i7-12800hx_firmware -
intel core_i7-1280p_firmware -
intel core_i7-12850hx_firmware -
intel core_i9-12900_firmware -
intel core_i9-12900f_firmware -
intel core_i9-12900h_firmware -
intel core_i9-12900hk_firmware -
intel core_i9-12900hx_firmware -
intel core_i9-12900k_firmware -
intel core_i9-12900kf_firmware -
intel core_i9-12900t_firmware -
intel core_i9-12950hx_firmware -
intel wi-fi_6e_ax210 -
intel wi-fi_6e_ax211 -
intel converged_security_and_manageability_engine *
intel core_i3-11100b_firmware -
intel core_i3-11100he_firmware -
intel core_i3-1110g4_firmware -
intel core_i3-1115g4_firmware -
intel core_i3-1115g4e_firmware -
intel core_i3-1115gre_firmware -
intel core_i3-1120g4_firmware -
intel core_i3-1125g4_firmware -
intel core_i5-11260h_firmware -
intel core_i5-11300h_firmware -
intel core_i5-1130g7_firmware -
intel core_i5-11320h_firmware -
intel core_i5-1135g7_firmware -
intel core_i5-11400_firmware -
intel core_i5-11400f_firmware -
intel core_i5-11400h_firmware -
intel core_i5-11400t_firmware -
intel core_i5-1140g7_firmware -
intel core_i5-1145g7_firmware -
intel core_i5-1145g7e_firmware -
intel core_i5-1145gre_firmware -
intel core_i5-11500_firmware -
intel core_i5-11500b_firmware -
intel core_i5-11500h_firmware -
intel core_i5-11500he_firmware -
intel core_i5-11500t_firmware -
intel core_i5-1155g7_firmware -
intel core_i5-11600_firmware -
intel core_i5-11600k_firmware -
intel core_i5-11600kf_firmware -
intel core_i5-11600t_firmware -
intel core_i7-11370h_firmware -
intel core_i7-11375h_firmware -
intel core_i7-11390h_firmware -
intel core_i7-11600h_firmware -
intel core_i7-1160g7_firmware -
intel core_i7-1165g7_firmware -
intel core_i7-11700_firmware -
intel core_i7-11700b_firmware -
intel core_i7-11700f_firmware -
intel core_i7-11700k_firmware -
intel core_i7-11700kf_firmware -
intel core_i7-11700t_firmware -
intel core_i7-11800h_firmware -
intel core_i7-1180g7_firmware -
intel core_i7-11850h_firmware -
intel core_i7-11850he_firmware -
intel core_i7-1185g7_firmware -
intel core_i7-1185g7e_firmware -
intel core_i7-1185gre_firmware -
intel core_i7-1195g7_firmware -
intel core_i9-11900_firmware -
intel core_i9-11900f_firmware -
intel core_i9-11900h_firmware -
intel core_i9-11900k_firmware -
intel core_i9-11900kb_firmware -
intel core_i9-11900kf_firmware -
intel core_i9-11900t_firmware -
intel core_i9-11950h_firmware -
intel core_i9-11980hk_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201 -
intel wi-fi_6_ax210 -
intel converged_security_and_manageability_engine *
intel core_i3-1000g1_firmware -
intel core_i3-1000g4_firmware -
intel core_i3-1000ng4_firmware -
intel core_i3-1005g1_firmware -
intel core_i3-10100_firmware -
intel core_i3-10100e_firmware -
intel core_i3-10100f_firmware -
intel core_i3-10100t_firmware -
intel core_i3-10100te_firmware -
intel core_i3-10100y_firmware -
intel core_i3-10105_firmware -
intel core_i3-10105f_firmware -
intel core_i3-10105t_firmware -
intel core_i3-10110u_firmware -
intel core_i3-10110y_firmware -
intel core_i3-10300_firmware -
intel core_i3-10300t_firmware -
intel core_i3-10305_firmware -
intel core_i3-10305t_firmware -
intel core_i3-10320_firmware -
intel core_i3-10325_firmware -
intel core_i5-10110y_firmware -
intel core_i5-10200h_firmware -
intel core_i5-10210u_firmware -
intel core_i5-10210y_firmware -
intel core_i5-10300h_firmware -
intel core_i5-1030g4_firmware -
intel core_i5-1030g7_firmware -
intel core_i5-1030ng7_firmware -
intel core_i5-10310u_firmware -
intel core_i5-10310y_firmware -
intel core_i5-1035g1_firmware -
intel core_i5-1035g4_firmware -
intel core_i5-1035g7_firmware -
intel core_i5-1038ng7_firmware -
intel core_i5-10400_firmware -
intel core_i5-10400f_firmware -
intel core_i5-10400h_firmware -
intel core_i5-10400t_firmware -
intel core_i5-10500_firmware -
intel core_i5-10500e_firmware -
intel core_i5-10500h_firmware -
intel core_i5-10500t_firmware -
intel core_i5-10500te_firmware -
intel core_i5-10505_firmware -
intel core_i5-10600_firmware -
intel core_i5-10600k_firmware -
intel core_i5-10600kf_firmware -
intel core_i5-10600t_firmware -
intel core_i5-10610u_firmware -
intel core_i7-10510u_firmware -
intel core_i7-10510y_firmware -
intel core_i7-1060g7_firmware -
intel core_i7-1060ng7_firmware -
intel core_i7-10610u_firmware -
intel core_i7-1065g7_firmware -
intel core_i7-1068ng7_firmware -
intel core_i7-10700_firmware -
intel core_i7-10700e_firmware -
intel core_i7-10700f_firmware -
intel core_i7-10700k_firmware -
intel core_i7-10700kf_firmware -
intel core_i7-10700t_firmware -
intel core_i7-10700te_firmware -
intel core_i7-10710u_firmware -
intel core_i7-10750h_firmware -
intel core_i7-10810u_firmware -
intel core_i7-10850h_firmware -
intel core_i7-10870h_firmware -
intel core_i7-10875h_firmware -
intel core_i9-10850h_firmware -
intel core_i9-10850k_firmware -
intel core_i9-10885h_firmware -
intel core_i9-10900_firmware -
intel core_i9-10900e_firmware -
intel core_i9-10900f_firmware -
intel core_i9-10900k_firmware -
intel core_i9-10900kf_firmware -
intel core_i9-10900t_firmware -
intel core_i9-10900te_firmware -
intel core_i9-10900x_firmware -
intel core_i9-10910_firmware -
intel core_i9-10920x_firmware -
intel core_i9-10940x_firmware -
intel core_i9-10980hk_firmware -
intel core_i9-10980xe_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201 -
intel wi-fi_6e_ax210 -
intel converged_security_and_manageability_engine *
intel core_i3-9100_firmware -
intel core_i3-9100e_firmware -
intel core_i3-9100f_firmware -
intel core_i3-9100hl_firmware -
intel core_i3-9100t_firmware -
intel core_i3-9100te_firmware -
intel core_i3-9130u_firmware -
intel core_i3-9300_firmware -
intel core_i3-9300t_firmware -
intel core_i3-9320_firmware -
intel core_i3-9350k_firmware -
intel core_i3-9350kf_firmware -
intel core_i5-9300h_firmware -
intel core_i5-9300hf_firmware -
intel core_i5-9400_firmware -
intel core_i5-9400f_firmware -
intel core_i5-9400h_firmware -
intel core_i5-9400t_firmware -
intel core_i5-9500_firmware -
intel core_i5-9500e_firmware -
intel core_i5-9500f_firmware -
intel core_i5-9500t_firmware -
intel core_i5-9500te_firmware -
intel core_i5-9600_firmware -
intel core_i5-9600k_firmware -
intel core_i5-9600kf_firmware -
intel core_i5-9600t_firmware -
intel core_i7-9700_firmware -
intel core_i7-9700e_firmware -
intel core_i7-9700f_firmware -
intel core_i7-9700k_firmware -
intel core_i7-9700kf_firmware -
intel core_i7-9700t_firmware -
intel core_i7-9700te_firmware -
intel core_i7-9750h_firmware -
intel core_i7-9750hf_firmware -
intel core_i7-9800x_firmware -
intel core_i7-9850h_firmware -
intel core_i7-9850he_firmware -
intel core_i7-9850hl_firmware -
intel core_i9-9800x_firmware -
intel core_i9-9820x_firmware -
intel core_i9-9880h_firmware -
intel core_i9-9900_firmware -
intel core_i9-9900k_firmware -
intel core_i9-9900kf_firmware -
intel core_i9-9900ks_firmware -
intel core_i9-9900t_firmware -
intel core_i9-9900x_firmware -
intel core_i9-9920x_firmware -
intel core_i9-9940x_firmware -
intel core_i9-9960x_firmware -
intel core_i9-9980hk_firmware -
intel core_i9-9980xe_firmware -
intel core_i9-9980xe_firmware -
intel wi-fi_6_ax200 -
intel converged_security_and_manageability_engine *
intel core_i3-8000_firmware -
intel core_i3-8000t_firmware -
intel core_i3-8020_firmware -
intel core_i3-8100_firmware -
intel core_i3-8100b_firmware -
intel core_i3-8100h_firmware -
intel core_i3-8100t_firmware -
intel core_i3-8109u_firmware -
intel core_i3-8120_firmware -
intel core_i3-8121u_firmware -
intel core_i3-8130u_firmware -
intel core_i3-8140u_firmware -
intel core_i3-8145u_firmware -
intel core_i3-8145ue_firmware -
intel core_i3-8300_firmware -
intel core_i3-8300t_firmware -
intel core_i3-8350k_firmware -
intel core_i5-8200y_firmware -
intel core_i5-8210y_firmware -
intel core_i5-8250u_firmware -
intel core_i5-8257u_firmware -
intel core_i5-8259u_firmware -
intel core_i5-8260u_firmware -
intel core_i5-8265u_firmware -
intel core_i5-8269u_firmware -
intel core_i5-8279u_firmware -
intel core_i5-8300h_firmware -
intel core_i5-8305g_firmware -
intel core_i5-8310y_firmware -
intel core_i5-8350u_firmware -
intel core_i5-8365u_firmware -
intel core_i5-8365ue_firmware -
intel core_i5-8400_firmware -
intel core_i5-8400b_firmware -
intel core_i5-8400h_firmware -
intel core_i5-8400t_firmware -
intel core_i5-8420_firmware -
intel core_i5-8420t_firmware -
intel core_i5-8500_firmware -
intel core_i5-8500b_firmware -
intel core_i5-8500t_firmware -
intel core_i5-8550_firmware -
intel core_i5-8550u_firmware -
intel core_i5-8600_firmware -
intel core_i5-8600k_firmware -
intel core_i5-8600t_firmware -
intel core_i5-8650_firmware -
intel core_i5-8650k_firmware -
intel core_i5-8700b_firmware -
intel core_i7-8086k_firmware -
intel core_i7-8500y_firmware -
intel core_i7-8510y_firmware -
intel core_i7-8550u_firmware -
intel core_i7-8557u_firmware -
intel core_i7-8559u_firmware -
intel core_i7-8560u_firmware -
intel core_i7-8565u_firmware -
intel core_i7-8569u_firmware -
intel core_i7-8650u_firmware -
intel core_i7-8665u_firmware -
intel core_i7-8665ue_firmware -
intel core_i7-8670_firmware -
intel core_i7-8670t_firmware -
intel core_i7-8700_firmware -
intel core_i7-8700b_firmware -
intel core_i7-8700k_firmware -
intel core_i7-8700t_firmware -
intel core_i7-8705g_firmware -
intel core_i7-8706g_firmware -
intel core_i7-8709g_firmware -
intel core_i7-8750h_firmware -
intel core_i7-8750hf_firmware -
intel core_i7-8809g_firmware -
intel core_i7-8850h_firmware -
intel core_i9-8950hk_firmware -
intel wi-fi_6_ax200 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer_wifi_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D0A60D-A406-4381-AF97-F43C09958373",
              "versionEndExcluding": "3.1122.3158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F65B54B-348E-4868-A53D-27C404F8B398",
              "versionEndExcluding": "22.140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_wifi_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D6EBDE-96E0-4446-A8D1-16502969D82B",
              "versionEndExcluding": "2.2.14.22176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E174EDF7-FBDB-411E-B05E-EF48FF0734D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C7F1E8-9939-452B-B166-35F4CAC73F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C25171-A7D3-4C99-B5A1-2EB81D595396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BA0FB5-002D-4556-BF7E-BD5D5E68B451",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33703EA-B5EF-41FF-8C5F-95F750D5387E",
              "versionEndExcluding": "16.1.25.1885v2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE550D6B-5197-461E-9F5B-295AB7F0BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C0C60C-7CF4-4A14-82F1-F0E574F7435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6954078-D47E-4E54-8CDB-1CCF4EE09C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E28C4D-97DC-4D75-A527-5D3606305B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14957D81-CB3A-4C3F-A88B-E2EEAA9ABB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C89A0-CC1C-49EE-B10D-63B98C00F3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB76AA51-27B9-4542-9E69-CA98FC7AC1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3D0F83-B6B8-42ED-91E6-D7626F03F2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCCF50F-9ABA-4A3D-B10C-15FA30720560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C973EA-12D7-4CF0-B343-4BE188DCDA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA543A5B-2DB1-484E-8C10-72B2D7483AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1105DE29-E206-4CA3-9D65-F36D96836F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "726420C9-2E0C-4B33-B5E0-D9C9DC9120D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6020A1-F88B-4903-984E-E394C8455518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE81AD5E-7D46-4534-A0E2-0A988B91325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C9476-CBC1-4D9E-A9C3-5443C8864F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51E74CB-FA01-4D78-85FE-3C17945E4FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B2F36D-369D-44A8-85B2-E75E7204D33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5855F355-5BA9-4EB6-922A-D2DAE5002247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDD387-B4BA-4403-B468-718B11E4D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D124457-2879-47F6-892D-76A4D94D1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A00C1C5-8F0D-45E7-B6FB-8D588D400F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CD143-5B44-49ED-A958-EB01E3606292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B66DA2-62B0-4267-8F9B-820CD1944927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F5DA6C-FEB5-48C3-BF66-F3352F2C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CDCE12-01E6-45DA-B72E-1BE4150BF1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0363669-1973-497A-A7BD-CEC197AEB224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E91FC7C-A392-4CEF-8AE8-8052F5153F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4500975-3845-443F-A67D-93B57324F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76AD3-58B6-4250-97CA-4D7DA77239D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC345E7-58DA-4A7C-9597-D94C2137E128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5E2BA7-DE2B-4357-8438-E812C81F568B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6B92D7-5FF4-4171-AB1F-46C94E48BC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A9DA1-A6EE-4E0A-BD4A-693CB01F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C0C316-08A1-492A-ACB4-9CAC6C66583E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A0388B-1227-4D61-AB19-145E725E2673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46779A84-F8E4-4AFC-8B93-A60CD31B3511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA30873-0BF9-4D36-ABFD-9AF14C104B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0402CD-AC88-4C2B-9CC1-EA9ED953DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8F0737-3F6C-4FBD-A3B5-23580E93041F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E05F6-E2DF-49C8-97D2-2978602C564C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440BD75-463D-4FB5-A0E8-F9992D5E604F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF771F3-E51D-44C8-A354-1989114899C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEC1232-ED43-48C8-BF9D-8AC5F97220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4066C0-0E3D-4181-8093-FB4B68AAE7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A030112-DE68-4596-A91C-7FD0B11770BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A160216C-95AD-42A7-9532-E1EA97A7CBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03484640-6AFE-425C-90A0-0AF5C5F3D92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3595DC8A-DA7A-4C2A-80A6-40FDBC87053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA5C2F-6184-4FAA-919F-EAA4E95458B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F7A967-B433-46C8-9742-47C073D59F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13A666A-B39F-4359-A638-29B6F0EBBB83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEAA993-1F40-4045-B1A8-6D1995F7D057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88759768-F065-4959-AA26-0F14AC2BEB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541B4AC-CF73-452D-9489-91ECCDFE7F33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3735297F-E6FE-4AB6-80BD-E498F84E32C1",
              "versionEndExcluding": "16.1.25.1865v6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE550D6B-5197-461E-9F5B-295AB7F0BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C0C60C-7CF4-4A14-82F1-F0E574F7435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6954078-D47E-4E54-8CDB-1CCF4EE09C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E28C4D-97DC-4D75-A527-5D3606305B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14957D81-CB3A-4C3F-A88B-E2EEAA9ABB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C89A0-CC1C-49EE-B10D-63B98C00F3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB76AA51-27B9-4542-9E69-CA98FC7AC1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3D0F83-B6B8-42ED-91E6-D7626F03F2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCCF50F-9ABA-4A3D-B10C-15FA30720560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C973EA-12D7-4CF0-B343-4BE188DCDA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA543A5B-2DB1-484E-8C10-72B2D7483AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1105DE29-E206-4CA3-9D65-F36D96836F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "726420C9-2E0C-4B33-B5E0-D9C9DC9120D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6020A1-F88B-4903-984E-E394C8455518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE81AD5E-7D46-4534-A0E2-0A988B91325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C9476-CBC1-4D9E-A9C3-5443C8864F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51E74CB-FA01-4D78-85FE-3C17945E4FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B2F36D-369D-44A8-85B2-E75E7204D33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5855F355-5BA9-4EB6-922A-D2DAE5002247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDD387-B4BA-4403-B468-718B11E4D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D124457-2879-47F6-892D-76A4D94D1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A00C1C5-8F0D-45E7-B6FB-8D588D400F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CD143-5B44-49ED-A958-EB01E3606292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B66DA2-62B0-4267-8F9B-820CD1944927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F5DA6C-FEB5-48C3-BF66-F3352F2C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CDCE12-01E6-45DA-B72E-1BE4150BF1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0363669-1973-497A-A7BD-CEC197AEB224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E91FC7C-A392-4CEF-8AE8-8052F5153F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4500975-3845-443F-A67D-93B57324F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76AD3-58B6-4250-97CA-4D7DA77239D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC345E7-58DA-4A7C-9597-D94C2137E128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5E2BA7-DE2B-4357-8438-E812C81F568B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6B92D7-5FF4-4171-AB1F-46C94E48BC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A9DA1-A6EE-4E0A-BD4A-693CB01F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C0C316-08A1-492A-ACB4-9CAC6C66583E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A0388B-1227-4D61-AB19-145E725E2673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46779A84-F8E4-4AFC-8B93-A60CD31B3511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA30873-0BF9-4D36-ABFD-9AF14C104B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0402CD-AC88-4C2B-9CC1-EA9ED953DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8F0737-3F6C-4FBD-A3B5-23580E93041F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E05F6-E2DF-49C8-97D2-2978602C564C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440BD75-463D-4FB5-A0E8-F9992D5E604F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF771F3-E51D-44C8-A354-1989114899C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEC1232-ED43-48C8-BF9D-8AC5F97220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4066C0-0E3D-4181-8093-FB4B68AAE7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A030112-DE68-4596-A91C-7FD0B11770BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A160216C-95AD-42A7-9532-E1EA97A7CBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03484640-6AFE-425C-90A0-0AF5C5F3D92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3595DC8A-DA7A-4C2A-80A6-40FDBC87053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA5C2F-6184-4FAA-919F-EAA4E95458B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F7A967-B433-46C8-9742-47C073D59F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13A666A-B39F-4359-A638-29B6F0EBBB83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEAA993-1F40-4045-B1A8-6D1995F7D057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88759768-F065-4959-AA26-0F14AC2BEB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541B4AC-CF73-452D-9489-91ECCDFE7F33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77359153-675C-47D3-9A00-0BAD9BE26CD8",
              "versionEndExcluding": "15.0.42.2235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-11100b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0464200B-C3A6-40ED-8261-DBA638484CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90291EE5-655A-4298-AF37-919EA2BC37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CD246D-3703-45A3-9CD2-17039A3B6C96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CFB83C-DB26-4E52-AF8A-ADB6839BDD8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C8E57-7E8B-4494-BE0E-E268AB2E4339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372ADB3F-1D20-442A-BCBE-87A41A71093D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E4714A-A1CF-492C-8553-584A41CA5B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE27BBD-F5C0-47FD-82CB-EF9763DF2866",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A331C0CA-06E5-4C46-91C4-1444780BC2DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69676C95-DB91-4FF2-B3F1-83E95FE84ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99645C51-90F3-4BDA-B9D4-AF747947481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE65B5E-60C0-47FD-B47A-12084959D291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36840EC4-CA42-40B5-8D0E-9CCE86B1A7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DC8DC6-15AF-4DB0-9A6A-4691FC9D86E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A36BB6-4EDD-4FF9-8786-C2A902C90C9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "427BE96A-0265-4979-8204-D555E601C519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2479723B-92C8-4C15-8766-DB7E1A911BD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18C4D03-8736-48E6-9A91-5D71C2D95AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "844B344E-FA5C-4E66-A7F0-99993CD20ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A7B207-2E2C-47DC-9DFD-AF98BA108B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5B827C-FA90-4435-8BC1-78362D79C289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0362D029-F6A8-4A21-A31D-FDB51293928A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A432D21-B015-4F5A-8726-AE506CC490FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "490D9F4F-E489-4502-9194-2EDA44E70F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F19AC344-835E-468B-9FB5-AB64A8A7E9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "720B135D-36C4-4204-A964-7D71DCFAAF29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED643C3A-84A6-4ED0-8A6F-DE160DA93B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3622470-6979-4438-8BDF-549CC339D417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D00D974-CBA7-4362-AF2F-042D15AC9790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24D3685-6DCA-40D0-8437-B0241A7597ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1089BC24-D092-41FE-8AA5-5742301B99AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E5C4F73-01EC-4396-BDE2-1ACE9E9C8C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80415BA-0D9A-4B96-9BDF-52A45DF82046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9371D656-8665-4D04-93E6-CF9476546BED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EE2586-A95C-4785-A264-39D30D4587E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A2043A3-466C-4142-9B2B-E63D6119ED09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E22745-5399-4CFD-8C4F-4DA52829DB2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "341575DD-4D03-44AC-8DE0-EA2A4768ABD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "579F1B28-1D6A-48DE-ABAB-398198224959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81805C4E-8192-4719-8F3C-6BD8C77E1B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2FF3DD-0986-4FB6-B17B-0AEFB0899672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C4FD26-557D-47F8-9E1C-D337ACDDF51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1327CC4-7F1D-422F-BD11-099D2DC18352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B522B4F-03D8-4BB8-920E-7847298EF9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF74D5F6-E3F3-40F5-823B-6814458CC541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B89D3F9-351C-4A0D-BD11-1BBE5ABD6B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C114D88-9FC8-4E43-8DD5-CA9618CDC9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58712583-BA04-409D-A43D-AAE4CAC2DC64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E06CE46-0FF7-4831-87B6-FA1EB958CF94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5814CF55-8867-445E-BE1E-795006B0E306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C17F5F-C6AE-4A7C-ACA0-1E8426ADC745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AD8E5F-BA66-4628-ACF0-1891588C0DBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED61822-778A-41FE-A85D-A44D300F800C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04975FEA-10AE-4E5A-A69D-553EE641D18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "609B3A40-365A-42EE-B1A1-CF73CD41AFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900kb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E481B14-0DEC-4176-B95A-EF53A05D4703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB27F8F4-9A4B-49B4-9286-4D209FBA8961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BFA38A-1059-4607-9CDC-F90DF7B90E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EB1527-0F25-422C-927D-0ED5924EA83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89B3F38-F128-4173-9DF4-2B5CC5786648",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51195995-2CB8-4978-B38B-B49E50F6B60C",
              "versionEndExcluding": "14.1.67.2046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75921058-8E13-460F-9F74-AF9C21DF353A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDD752C-BE5E-4EE7-9541-CAE85E5E237A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000ng4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070EC3E9-B224-49F4-94D5-8A18AD47EBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E2359B-38A9-4962-B819-1C438390BF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA80297-A747-45A0-81EA-2367F2D88053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "128AF2E8-0FDD-42FA-9F3A-7939E1D06389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BFE70F-8E5F-46C8-8675-3D5C114BF98A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E324A6-6F59-47A2-A941-3CEB70F5B70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73917CEB-A661-4E21-ADB5-2F7C545F937A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB644F0-D66B-4CE6-96A5-5AE895FC0315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88A42CB-3AD3-4621-AA0D-F24636DA9903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD66BFB8-0725-408E-B7C8-9EE2FB5EE1CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33FA193-AA3B-439D-94D4-060172C7D371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE22EAE0-A356-4194-9287-FE70FCE16135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FECACD-46EF-4DBE-ACA9-D0FB9311FCF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE6184E-9929-4F23-8834-9B0E15A4131D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6544E460-1B23-43B5-92A4-13CF61AF08A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6228E-13A2-47CF-87B4-CB34A1FA4B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F130A798-2FCC-43DB-9A42-367C4BB580E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D72A6E-AAEA-49A8-92D8-FFED7220E263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F542B269-6281-47C4-86CE-72BC9180D90E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F74DD9E-0D1F-44B9-B3CB-7F85F4E540B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "646F0510-9532-466C-B43B-8E869384A52E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA03DCF-A603-41F8-A38B-6757BFA270FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96CA5B1-ED93-4423-9C4C-EFCB3F63767A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "530E334B-4B32-4F96-B67B-194A7B46E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ECE587-9DC0-4989-97AC-DD2B7EEAE7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DA87ECA-F5EC-42A5-8A43-6D47242A2756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3F8BD6-027E-4A6A-B7FC-99443BC13A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "255A4636-57B9-491E-B213-02E3B4EFB6B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "150F855A-EC0D-483F-99A8-DDD33AAE1F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "497FAB39-DA53-4447-B1FC-144C725135D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2115591-782B-492C-9A43-1EF612309E6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BC109D-F210-4BB0-80B1-BC877F322E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA43369-7A3F-45F4-B45C-0435499336CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388D5427-0439-4F89-9D80-3AEDB853B2CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E50D6E-C759-46F4-A794-5DD83E971BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AA0B0A-19E2-4F4B-B1E1-09F4DFED737B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21EAC0D6-D5E2-42D6-B105-BCF09C35BC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3548B071-7C6E-402D-8292-84E1400BDC07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10610u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB122B67-2D59-445D-855E-6C79A385DE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED7ED67-CE89-4585-A146-E9B1C5CFFCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1060ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92A3211-DD20-49BA-A1DA-615D823A42A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C752B58-0750-4487-845B-9D657079BDED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA13A2D-14CE-4C48-A746-E6068BA343EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA2457A-D89A-4F3E-95D3-3C839F3C0365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A6D39D-7897-48E4-BEB3-7D71E8E42EEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95AC35A3-6F6D-4F61-872E-6E73F958449B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD3DB08-E718-4A66-A1AC-B31FA97E42C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E029771-4205-49E6-9635-E03A66F877FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9D6D38-180E-4CD1-B6A6-765E67DF97B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D41E4EDE-51B2-4618-AD9B-AEDF07D47775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B232700-BC3E-49B0-9814-FB37958B6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85113D54-52E5-4372-8FD5-DC37DCBE9DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "215576B4-3ABA-4F65-8DA4-F07C1750C99B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBEEB17-29AB-4F3A-A0CC-68386A315050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA7D248-0833-44D6-81A6-FFD24E54AE80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB36606-33D0-42DF-A7B5-ED4E5E7061A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E412013-D537-4E86-AA5C-08016531405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CF9E46-7F23-4910-B09C-E2BADDC793B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B82BF5-F105-4686-A352-6BDD7FB2DC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF885F34-941A-4147-B755-3260A22A6825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C04E06-708E-4103-9238-A7451189DBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6428C73-6A64-4619-983F-3871B4CE1472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "576C6801-0DBF-4D1C-B5CF-55E25BDFFD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "465D3B92-2BC3-4F0A-A792-564361B2A1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "916A238A-64B9-483C-A0FB-8144B4D5EFFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE472FC-4776-4FD1-AE36-3D9934A60BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10910_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5351528-6FC1-4CA4-82E8-BC252A950B34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "470B28CA-4990-4AF8-9CF5-C2A1B037FFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F8E079-4941-4878-8DC3-4B74BD832724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4648D9A9-4050-4753-A7B3-E56C0F7E22F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8583AC-0D66-466C-8024-15A520803534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAD995C-5D8D-4FE1-91BF-45FF893E7C0C",
              "versionEndExcluding": "12.0.92.2145v3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B8A8CC-9009-4CF0-894F-97079FD27796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62EB1BA-2704-4A4D-BA6D-F8BFE748D0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E4F07F-B972-423F-BCFF-E27B3207B493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2908EB-97F4-4DAE-802F-1011FD2587DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD20B8F2-FCD6-454F-955F-9F59B140593C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6FA4984-0018-40A5-99F8-C6FF809F9494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9130u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F454B00-67EF-468A-88DA-C98C67FC0942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "196BA038-162F-4E30-8DE3-6FFB35102A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769E9A01-C94B-4254-8510-ABE32567E22D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC85FC5-274A-43B1-A9B6-245130812551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777DB8E3-3958-40F0-BF2D-B319F9FA3795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E9BA09-E255-438E-9938-3F51A78A3331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BFA4824-F934-4602-A6ED-A14B602A4575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4DDD41-51CD-40FF-BCB0-29D559C1CAD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95AB3F9-7B28-46F8-8882-4976DBBCC767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF61383-1558-4AE6-97ED-3B8A20667EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C646A5D0-1A9D-4E65-AC62-070959C38CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "060B891D-A885-4BE5-B4C4-3384CBBF2B28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE853A14-BAA9-4B48-8B0A-F5DAE8D051CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F5E016-5AB5-4DB5-BDB0-75AE14253413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662A5846-DA15-431B-9392-F0BA5457FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "199A5D61-EB42-4C3C-9344-4CA497358D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1163CF40-4D70-4965-8229-B102D754ECD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FD2F07-6CD0-4708-8D11-3BA0AEFD5271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455BC769-5B19-4B91-844B-15B4FB2401E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "027639C1-CA74-4F02-98E3-9C93E71DD7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "581CCD85-F9BA-4AE0-8FCD-4118C13C1080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66250BC-0338-40E8-9E9F-706F2DA5E5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E48F04-9B55-4162-BB28-07FFD3D5194D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E50CC66-0FC3-4825-B677-EBF34D6804B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A12922-9D6D-49E8-B9C6-DD74CD60FAFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "165E3D96-24EA-4F47-9692-30823C482BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E86ACD76-A1A6-4B99-A521-38C706AF2EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82BAF85-06A9-4AEE-94D2-3CAF4607623E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*",
              "matchCriteriaId": "5C281835-B593-4824-A061-F042409D855C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAD995C-5D8D-4FE1-91BF-45FF893E7C0C",
              "versionEndExcluding": "12.0.92.2145v3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FEAC4F-B30C-44E2-B7A1-BA4367334008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8000t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC60BA46-EA85-45A4-8C9A-2FD49C2CD9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8020_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACC9389-15BB-4AE3-A3EF-9F36D0D54230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6325AFF1-8B27-408C-ADC3-E1FA826A2B9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D96F9D-50ED-47B4-9DC9-1C6807C70129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "792B6DC2-0EE1-486E-B44A-F0971C12B1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9147C908-0B5E-4CC4-BFDA-FDC8219494A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CAE5F9-E9D5-4EE1-A02D-88707B118C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "071E5109-EDDC-47DA-85DA-84AE102386F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8121u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4801359-0950-4DED-A394-512737A263DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB32980-A87F-4AC6-9F1C-EA690582DECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E786A817-3F20-4DB9-BC86-EF0AEC3C131F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1100AAC2-5A94-4EF3-AB94-AB4B4085F109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17773338-62E3-4F05-86D1-7E3D157C78C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30904062-0998-4D93-8F61-36C41BCD11F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC25F057-A548-4E02-A464-8AE97B40A39D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F99AFDF6-1B9C-4F06-A827-F0C5052EA485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9C3DCA2-6087-4286-A84A-6091149083C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "813C2CF3-2370-4FC9-86F1-85FA6597EDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C71C3D-D137-4302-8B35-3A2AA08DD92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444C585D-8DAD-4D4E-99CB-23B38A2F2561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2797768-C460-4901-99BE-148A7BADC020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CAAFA25-2328-4B29-8B4C-CAA34A3F07DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7001A74-CFF9-4CBB-A72B-E476C22ADF07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F1036B8-CB05-4DC5-AB07-ACCC6351B9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E3236A7-F174-4A47-90B3-7E0457CB3455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CF5BB43-9A54-4F8F-86EB-04B56135F69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE8EAB7-E619-4140-9FF2-F01DD57DD286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DB74AB-9D98-40B0-9715-EF934125C228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D6D69D-3EA5-4F5A-A64E-E561994BC7A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4ECE37-14C8-4035-9410-F66AF586934D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDC571E-D4F4-4837-9462-781B9085DDA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8420_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4D7564-46B9-4B1D-9B43-D539BBFE1AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8420t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "457FF494-B454-4DC7-A311-711C817905FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4B23DC-BB43-4BF2-B96A-3A531EC603C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495C794A-3EB2-4C2B-8312-65C1C70EFFAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "382FEC53-468F-41B4-A639-5875F6C62DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCDBD532-C038-4C69-841F-DC4B09F5A99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4079D92-EF02-4003-B8B0-0EFD4DCAF8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5BEE28-D0F7-44F0-8B01-69EEF249FDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB2544C-BD41-4316-BDAD-30B4DDF785EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD242386-919B-4B0C-A7C9-D045C0977FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB634C16-35A0-43D5-98D7-B60E7097B732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8650k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13EB04A-F81C-4956-9324-6D972D4CC3D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD0F061-1664-4C0C-9207-8991C6F79F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8510y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5164EB-8ED3-4FB3-8B90-F5FEAD490D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B60A1C2-D6E2-43B3-967C-746CDC2F96CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7600A08-3EA6-4A3D-8B5E-5F0C5E6A7E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "942B77AD-CEA4-4A9F-B748-155916A4917A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54606FA5-02CE-43C5-9153-FB1070E9DD15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8670_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372261C6-7E3B-40DC-95EB-E4AC6926F3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8670t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC5EA2EC-2707-484F-AC5E-40BCAD09D7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "881A1690-F94A-41E4-9F38-BAD170153B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB18769-9DDD-4321-B123-BFF81A02DA4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos productos Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi y Killer(TM) WiFi puede permitir que usuarios no autenticados habiliten potencialmente la Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2022-26047",
  "lastModified": "2024-11-21T06:53:21.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-11T16:15:12.333",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:03
Summary
Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "El cumplimiento insuficiente de las convenciones esperadas para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-32642",
  "lastModified": "2024-11-21T08:03:45.420",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:52.350",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1076"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:12
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "575B6D56-BF5F-4D79-A3D4-253BC199B483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax203:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7B5478E-CE97-4514-A054-8BE1871623AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2022-36351",
  "lastModified": "2024-11-21T07:12:50.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:12.807",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}