Vulnerabilites related to intel - proset\/wireless_wifi
cve-2020-24458
Vulnerability from cvelistv5
Published
2021-02-17 13:45
Modified
2024-08-04 15:12
Severity ?
Summary
Incomplete cleanup in some Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers before version 22.0 may allow a privileged user to potentially enable information disclosure and denial of service<b>&nbsp;</b>via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers Version: before version 22.0
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:08.979Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00448.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incomplete cleanup in some Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers before version 22.0 may allow a privileged user to potentially enable information disclosure and denial of service\u003cb\u003e\u0026nbsp;\u003c/b\u003evia adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure and denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-17T13:45:47",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00448.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24458",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incomplete cleanup in some Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers before version 22.0 may allow a privileged user to potentially enable information disclosure and denial of service\u003cb\u003e\u0026nbsp;\u003c/b\u003evia adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure and denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00448.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00448.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24458",
    "datePublished": "2021-02-17T13:45:47",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:08.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-0558
Vulnerability from cvelistv5
Published
2020-04-15 16:58
Modified
2024-08-04 06:02
Severity ?
Summary
Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Version: Before version 21.70
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.309Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 21.70"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-15T16:58:21",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0558",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 21.70"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0558",
    "datePublished": "2020-04-15T16:58:21",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.309Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-36351
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-02 14:10
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software Version: See references
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:00:04.535Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-36351",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:06:11.743007Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:10:17.905Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:54.506Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-36351",
    "datePublished": "2023-08-11T02:36:54.506Z",
    "dateReserved": "2022-08-10T03:00:23.005Z",
    "dateUpdated": "2024-10-02T14:10:17.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11153
Vulnerability from cvelistv5
Published
2019-11-14 16:55
Modified
2024-08-04 22:48
Severity ?
Summary
Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.656Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:55:53",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11153",
    "datePublished": "2019-11-14T16:55:53",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.656Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26047
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 04:56
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T04:56:37.498Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T17:46:32.386Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-26047",
    "datePublished": "2022-11-11T15:49:13.792Z",
    "dateReserved": "2022-04-05T15:11:17.482Z",
    "dateUpdated": "2024-08-03T04:56:37.498Z",
    "requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28714
Vulnerability from cvelistv5
Published
2023-08-11 02:37
Modified
2024-10-17 13:55
Summary
Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi software for Windows Version: before version 22.220 HF (Hot Fix)
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T13:43:23.842Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel_proset_wireless_wifi_software_for_windows:intel_proset_wireless_wifi_software_for_windows:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "intel_proset_wireless_wifi_software_for_windows",
            "vendor": "intel_proset_wireless_wifi_software_for_windows",
            "versions": [
              {
                "lessThan": "22.220 HF",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-28714",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T13:40:51.751429Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-863",
                "description": "CWE-863 Incorrect Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T13:55:10.459Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi software for Windows",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.220 HF (Hot Fix)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:37:13.625Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-28714",
    "datePublished": "2023-08-11T02:37:13.625Z",
    "dateReserved": "2023-03-22T03:00:05.349Z",
    "dateUpdated": "2024-10-17T13:55:10.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-0557
Vulnerability from cvelistv5
Published
2020-04-15 16:58
Modified
2024-08-04 06:02
Severity ?
Summary
Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Version: Before version 21.70
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.200Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 21.70"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-15T16:58:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0557",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 21.70"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0557",
    "datePublished": "2020-04-15T16:58:14",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.200Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-27635
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-10 18:17
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software Version: See references
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:32:59.881Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-27635",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T18:17:23.736851Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T18:17:37.487Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:52.838Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-27635",
    "datePublished": "2023-08-11T02:36:52.838Z",
    "dateReserved": "2022-03-21T23:31:41.455Z",
    "dateUpdated": "2024-10-10T18:17:37.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12313
Vulnerability from cvelistv5
Published
2020-11-13 20:00
Modified
2024-08-04 11:56
Severity ?
Summary
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Version: before version 21.110
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.380Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 21.110"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-13T20:00:37",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 21.110"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12313",
    "datePublished": "2020-11-13T20:00:37",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.380Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11156
Vulnerability from cvelistv5
Published
2019-11-14 16:54
Modified
2024-08-04 22:48
Severity ?
Summary
Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.526Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Software Security",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:54:27",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Software Security",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11156",
    "datePublished": "2019-11-14T16:54:27",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.526Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-46329
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-10 18:16
Summary
Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi software Version: See references
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:31:46.298Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-46329",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-10T18:16:32.024332Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-10T18:16:50.575Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-693",
              "description": "Protection mechanism failure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:53.416Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-46329",
    "datePublished": "2023-08-11T02:36:53.416Z",
    "dateReserved": "2022-12-06T04:00:03.867Z",
    "dateUpdated": "2024-10-10T18:16:50.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-38076
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-02 14:10
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software Version: See references
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:45:52.414Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-38076",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:04:47.298624Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:10:01.100Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:55.105Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-38076",
    "datePublished": "2023-08-11T02:36:55.105Z",
    "dateReserved": "2022-08-10T03:00:25.306Z",
    "dateUpdated": "2024-10-02T14:10:01.100Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12314
Vulnerability from cvelistv5
Published
2020-11-12 18:11
Modified
2024-08-04 11:56
Severity ?
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Version: before version 21.110
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.274Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 21.110"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-12T18:11:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12314",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 21.110"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12314",
    "datePublished": "2020-11-12T18:11:00",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.274Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-40964
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-02 14:11
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software Version: See references
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:28:42.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-40964",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:06:56.361248Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:11:25.783Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:53.959Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-40964",
    "datePublished": "2023-08-11T02:36:53.959Z",
    "dateReserved": "2022-09-27T00:28:29.138Z",
    "dateUpdated": "2024-10-02T14:11:25.783Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11155
Vulnerability from cvelistv5
Published
2019-11-14 16:54
Modified
2024-08-04 22:48
Severity ?
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Software Security",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:54:16",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11155",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Software Security",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11155",
    "datePublished": "2019-11-14T16:54:16",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-3701
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-05 04:50
Severity ?
Summary
Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Advisory Version: Versions 20.100 and before.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T04:50:30.443Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K00245734"
          },
          {
            "name": "108387",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108387"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-27701"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Software Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 20.100 and before."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-19T03:06:04",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K00245734"
        },
        {
          "name": "108387",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108387"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-27701"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2018-3701",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Software Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 20.100 and before."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html"
            },
            {
              "name": "https://support.f5.com/csp/article/K00245734",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K00245734"
            },
            {
              "name": "108387",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108387"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-27701",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-27701"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2018-3701",
    "datePublished": "2019-05-17T15:41:38",
    "dateReserved": "2017-12-28T00:00:00",
    "dateUpdated": "2024-08-05T04:50:30.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12318
Vulnerability from cvelistv5
Published
2020-11-12 18:11
Modified
2024-08-04 11:56
Severity ?
Summary
Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Version: before version 21.110
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:50.472Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 21.110"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-12T18:11:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12318",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 21.110"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12318",
    "datePublished": "2020-11-12T18:11:10",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:50.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12319
Vulnerability from cvelistv5
Published
2020-11-12 18:11
Modified
2024-08-04 11:56
Severity ?
Summary
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Version: before version 21.110
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.372Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 21.110"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-12T18:11:48",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12319",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 21.110"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12319",
    "datePublished": "2020-11-12T18:11:48",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.372Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11154
Vulnerability from cvelistv5
Published
2019-11-14 16:53
Modified
2024-08-04 22:48
Severity ?
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.276Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Software Security",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:53:59",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11154",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Software Security",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11154",
    "datePublished": "2019-11-14T16:53:59",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.276Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0136
Vulnerability from cvelistv5
Published
2019-06-13 15:36
Modified
2024-08-04 17:44
Severity ?
Summary
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel® PROSet/Wireless WiFi Software Version: Please see reference document.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:14.593Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html"
          },
          {
            "name": "108777",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108777"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-27828"
          },
          {
            "name": "JVN#75617741",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN75617741/index.html"
          },
          {
            "name": "USN-4115-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4115-1/"
          },
          {
            "name": "USN-4118-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4118-1/"
          },
          {
            "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
          },
          {
            "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
          },
          {
            "name": "USN-4145-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4145-1/"
          },
          {
            "name": "USN-4147-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4147-1/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
          },
          {
            "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel\u00ae PROSet/Wireless WiFi Software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Please see reference document."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-02T19:06:41",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html"
        },
        {
          "name": "108777",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108777"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-27828"
        },
        {
          "name": "JVN#75617741",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN75617741/index.html"
        },
        {
          "name": "USN-4115-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4115-1/"
        },
        {
          "name": "USN-4118-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4118-1/"
        },
        {
          "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
        },
        {
          "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
        },
        {
          "name": "USN-4145-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4145-1/"
        },
        {
          "name": "USN-4147-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4147-1/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
        },
        {
          "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-0136",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel\u00ae PROSet/Wireless WiFi Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Please see reference document."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html"
            },
            {
              "name": "108777",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108777"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-27828",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-27828"
            },
            {
              "name": "JVN#75617741",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN75617741/index.html"
            },
            {
              "name": "USN-4115-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4115-1/"
            },
            {
              "name": "USN-4118-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4118-1/"
            },
            {
              "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
            },
            {
              "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
            },
            {
              "name": "USN-4145-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4145-1/"
            },
            {
              "name": "USN-4147-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4147-1/"
            },
            {
              "name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
            },
            {
              "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-0136",
    "datePublished": "2019-06-13T15:36:25",
    "dateReserved": "2018-11-13T00:00:00",
    "dateUpdated": "2024-08-04T17:44:14.593Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12317
Vulnerability from cvelistv5
Published
2020-11-12 18:11
Modified
2024-08-04 11:56
Severity ?
Summary
Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Version: before version 21.110
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.219Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 21.110"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-12T18:11:16",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12317",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 21.110"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12317",
    "datePublished": "2020-11-12T18:11:16",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.219Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "898671D5-38BA-4822-8C9B-68E871BFC0BE",
              "versionEndExcluding": "21.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Unos problemas de corrupci\u00f3n de memoria en la extensi\u00f3n DLL de Intel\u00ae PROSet/Wireless WiFi Software versiones anteriores a la versi\u00f3n 21.40, pueden permitir a un usuario autenticado potencialmente permitir una escalada de privilegios, una divulgaci\u00f3n de informaci\u00f3n y una denegaci\u00f3n de servicio por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11153",
  "lastModified": "2024-11-21T04:20:37.903",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.460",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:53
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel killer_wifi_software *
intel proset\/wireless_wifi *
intel uefi_wifi_driver *
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel killer_wi-fi_6e_ax1690_firmware -
intel killer_wi-fi_6e_ax1690 -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -
intel wi-fi_6_ax210_firmware -
intel wi-fi_6_ax210 -
intel wi-fi_6_ax211_firmware -
intel wi-fi_6_ax211 -
intel wi-fi_6_ax411_firmware -
intel wi-fi_6_ax411 -
intel converged_security_and_manageability_engine *
intel core_i3-12100_firmware -
intel core_i3-12100f_firmware -
intel core_i3-12100t_firmware -
intel core_i3-1210u_firmware -
intel core_i3-1215u_firmware -
intel core_i3-1220p_firmware -
intel core_i3-12300_firmware -
intel core_i3-12300t_firmware -
intel core_i5-1230u_firmware -
intel core_i5-1235u_firmware -
intel core_i5-12400_firmware -
intel core_i5-12400f_firmware -
intel core_i5-12400t_firmware -
intel core_i5-1240p_firmware -
intel core_i5-1240u_firmware -
intel core_i5-12450h_firmware -
intel core_i5-12450hx_firmware -
intel core_i5-1245u_firmware -
intel core_i5-12500_firmware -
intel core_i5-12500h_firmware -
intel core_i5-12500t_firmware -
intel core_i5-1250p_firmware -
intel core_i5-12600_firmware -
intel core_i5-12600h_firmware -
intel core_i5-12600hx_firmware -
intel core_i5-12600k_firmware -
intel core_i5-12600kf_firmware -
intel core_i5-12600t_firmware -
intel core_i7-1250u_firmware -
intel core_i7-1255u_firmware -
intel core_i7-1260p_firmware -
intel core_i7-1260u_firmware -
intel core_i7-12650h_firmware -
intel core_i7-12650hx_firmware -
intel core_i7-1265u_firmware -
intel core_i7-12700_firmware -
intel core_i7-12700f_firmware -
intel core_i7-12700h_firmware -
intel core_i7-12700k_firmware -
intel core_i7-12700kf_firmware -
intel core_i7-12700t_firmware -
intel core_i7-1270p_firmware -
intel core_i7-12800h_firmware -
intel core_i7-12800hx_firmware -
intel core_i7-1280p_firmware -
intel core_i7-12850hx_firmware -
intel core_i9-12900_firmware -
intel core_i9-12900f_firmware -
intel core_i9-12900h_firmware -
intel core_i9-12900hk_firmware -
intel core_i9-12900hx_firmware -
intel core_i9-12900k_firmware -
intel core_i9-12900kf_firmware -
intel core_i9-12900t_firmware -
intel core_i9-12950hx_firmware -
intel wi-fi_6e_ax210 -
intel wi-fi_6e_ax211 -
intel converged_security_and_manageability_engine *
intel core_i3-12100_firmware -
intel core_i3-12100f_firmware -
intel core_i3-12100t_firmware -
intel core_i3-1210u_firmware -
intel core_i3-1215u_firmware -
intel core_i3-1220p_firmware -
intel core_i3-12300_firmware -
intel core_i3-12300t_firmware -
intel core_i5-1230u_firmware -
intel core_i5-1235u_firmware -
intel core_i5-12400_firmware -
intel core_i5-12400f_firmware -
intel core_i5-12400t_firmware -
intel core_i5-1240p_firmware -
intel core_i5-1240u_firmware -
intel core_i5-12450h_firmware -
intel core_i5-12450hx_firmware -
intel core_i5-1245u_firmware -
intel core_i5-12500_firmware -
intel core_i5-12500h_firmware -
intel core_i5-12500t_firmware -
intel core_i5-1250p_firmware -
intel core_i5-12600_firmware -
intel core_i5-12600h_firmware -
intel core_i5-12600hx_firmware -
intel core_i5-12600k_firmware -
intel core_i5-12600kf_firmware -
intel core_i5-12600t_firmware -
intel core_i7-1250u_firmware -
intel core_i7-1255u_firmware -
intel core_i7-1260p_firmware -
intel core_i7-1260u_firmware -
intel core_i7-12650h_firmware -
intel core_i7-12650hx_firmware -
intel core_i7-1265u_firmware -
intel core_i7-12700_firmware -
intel core_i7-12700f_firmware -
intel core_i7-12700h_firmware -
intel core_i7-12700k_firmware -
intel core_i7-12700kf_firmware -
intel core_i7-12700t_firmware -
intel core_i7-1270p_firmware -
intel core_i7-12800h_firmware -
intel core_i7-12800hx_firmware -
intel core_i7-1280p_firmware -
intel core_i7-12850hx_firmware -
intel core_i9-12900_firmware -
intel core_i9-12900f_firmware -
intel core_i9-12900h_firmware -
intel core_i9-12900hk_firmware -
intel core_i9-12900hx_firmware -
intel core_i9-12900k_firmware -
intel core_i9-12900kf_firmware -
intel core_i9-12900t_firmware -
intel core_i9-12950hx_firmware -
intel wi-fi_6e_ax210 -
intel wi-fi_6e_ax211 -
intel converged_security_and_manageability_engine *
intel core_i3-11100b_firmware -
intel core_i3-11100he_firmware -
intel core_i3-1110g4_firmware -
intel core_i3-1115g4_firmware -
intel core_i3-1115g4e_firmware -
intel core_i3-1115gre_firmware -
intel core_i3-1120g4_firmware -
intel core_i3-1125g4_firmware -
intel core_i5-11260h_firmware -
intel core_i5-11300h_firmware -
intel core_i5-1130g7_firmware -
intel core_i5-11320h_firmware -
intel core_i5-1135g7_firmware -
intel core_i5-11400_firmware -
intel core_i5-11400f_firmware -
intel core_i5-11400h_firmware -
intel core_i5-11400t_firmware -
intel core_i5-1140g7_firmware -
intel core_i5-1145g7_firmware -
intel core_i5-1145g7e_firmware -
intel core_i5-1145gre_firmware -
intel core_i5-11500_firmware -
intel core_i5-11500b_firmware -
intel core_i5-11500h_firmware -
intel core_i5-11500he_firmware -
intel core_i5-11500t_firmware -
intel core_i5-1155g7_firmware -
intel core_i5-11600_firmware -
intel core_i5-11600k_firmware -
intel core_i5-11600kf_firmware -
intel core_i5-11600t_firmware -
intel core_i7-11370h_firmware -
intel core_i7-11375h_firmware -
intel core_i7-11390h_firmware -
intel core_i7-11600h_firmware -
intel core_i7-1160g7_firmware -
intel core_i7-1165g7_firmware -
intel core_i7-11700_firmware -
intel core_i7-11700b_firmware -
intel core_i7-11700f_firmware -
intel core_i7-11700k_firmware -
intel core_i7-11700kf_firmware -
intel core_i7-11700t_firmware -
intel core_i7-11800h_firmware -
intel core_i7-1180g7_firmware -
intel core_i7-11850h_firmware -
intel core_i7-11850he_firmware -
intel core_i7-1185g7_firmware -
intel core_i7-1185g7e_firmware -
intel core_i7-1185gre_firmware -
intel core_i7-1195g7_firmware -
intel core_i9-11900_firmware -
intel core_i9-11900f_firmware -
intel core_i9-11900h_firmware -
intel core_i9-11900k_firmware -
intel core_i9-11900kb_firmware -
intel core_i9-11900kf_firmware -
intel core_i9-11900t_firmware -
intel core_i9-11950h_firmware -
intel core_i9-11980hk_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201 -
intel wi-fi_6_ax210 -
intel converged_security_and_manageability_engine *
intel core_i3-1000g1_firmware -
intel core_i3-1000g4_firmware -
intel core_i3-1000ng4_firmware -
intel core_i3-1005g1_firmware -
intel core_i3-10100_firmware -
intel core_i3-10100e_firmware -
intel core_i3-10100f_firmware -
intel core_i3-10100t_firmware -
intel core_i3-10100te_firmware -
intel core_i3-10100y_firmware -
intel core_i3-10105_firmware -
intel core_i3-10105f_firmware -
intel core_i3-10105t_firmware -
intel core_i3-10110u_firmware -
intel core_i3-10110y_firmware -
intel core_i3-10300_firmware -
intel core_i3-10300t_firmware -
intel core_i3-10305_firmware -
intel core_i3-10305t_firmware -
intel core_i3-10320_firmware -
intel core_i3-10325_firmware -
intel core_i5-10110y_firmware -
intel core_i5-10200h_firmware -
intel core_i5-10210u_firmware -
intel core_i5-10210y_firmware -
intel core_i5-10300h_firmware -
intel core_i5-1030g4_firmware -
intel core_i5-1030g7_firmware -
intel core_i5-1030ng7_firmware -
intel core_i5-10310u_firmware -
intel core_i5-10310y_firmware -
intel core_i5-1035g1_firmware -
intel core_i5-1035g4_firmware -
intel core_i5-1035g7_firmware -
intel core_i5-1038ng7_firmware -
intel core_i5-10400_firmware -
intel core_i5-10400f_firmware -
intel core_i5-10400h_firmware -
intel core_i5-10400t_firmware -
intel core_i5-10500_firmware -
intel core_i5-10500e_firmware -
intel core_i5-10500h_firmware -
intel core_i5-10500t_firmware -
intel core_i5-10500te_firmware -
intel core_i5-10505_firmware -
intel core_i5-10600_firmware -
intel core_i5-10600k_firmware -
intel core_i5-10600kf_firmware -
intel core_i5-10600t_firmware -
intel core_i5-10610u_firmware -
intel core_i7-10510u_firmware -
intel core_i7-10510y_firmware -
intel core_i7-1060g7_firmware -
intel core_i7-1060ng7_firmware -
intel core_i7-10610u_firmware -
intel core_i7-1065g7_firmware -
intel core_i7-1068ng7_firmware -
intel core_i7-10700_firmware -
intel core_i7-10700e_firmware -
intel core_i7-10700f_firmware -
intel core_i7-10700k_firmware -
intel core_i7-10700kf_firmware -
intel core_i7-10700t_firmware -
intel core_i7-10700te_firmware -
intel core_i7-10710u_firmware -
intel core_i7-10750h_firmware -
intel core_i7-10810u_firmware -
intel core_i7-10850h_firmware -
intel core_i7-10870h_firmware -
intel core_i7-10875h_firmware -
intel core_i9-10850h_firmware -
intel core_i9-10850k_firmware -
intel core_i9-10885h_firmware -
intel core_i9-10900_firmware -
intel core_i9-10900e_firmware -
intel core_i9-10900f_firmware -
intel core_i9-10900k_firmware -
intel core_i9-10900kf_firmware -
intel core_i9-10900t_firmware -
intel core_i9-10900te_firmware -
intel core_i9-10900x_firmware -
intel core_i9-10910_firmware -
intel core_i9-10920x_firmware -
intel core_i9-10940x_firmware -
intel core_i9-10980hk_firmware -
intel core_i9-10980xe_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201 -
intel wi-fi_6e_ax210 -
intel converged_security_and_manageability_engine *
intel core_i3-9100_firmware -
intel core_i3-9100e_firmware -
intel core_i3-9100f_firmware -
intel core_i3-9100hl_firmware -
intel core_i3-9100t_firmware -
intel core_i3-9100te_firmware -
intel core_i3-9130u_firmware -
intel core_i3-9300_firmware -
intel core_i3-9300t_firmware -
intel core_i3-9320_firmware -
intel core_i3-9350k_firmware -
intel core_i3-9350kf_firmware -
intel core_i5-9300h_firmware -
intel core_i5-9300hf_firmware -
intel core_i5-9400_firmware -
intel core_i5-9400f_firmware -
intel core_i5-9400h_firmware -
intel core_i5-9400t_firmware -
intel core_i5-9500_firmware -
intel core_i5-9500e_firmware -
intel core_i5-9500f_firmware -
intel core_i5-9500t_firmware -
intel core_i5-9500te_firmware -
intel core_i5-9600_firmware -
intel core_i5-9600k_firmware -
intel core_i5-9600kf_firmware -
intel core_i5-9600t_firmware -
intel core_i7-9700_firmware -
intel core_i7-9700e_firmware -
intel core_i7-9700f_firmware -
intel core_i7-9700k_firmware -
intel core_i7-9700kf_firmware -
intel core_i7-9700t_firmware -
intel core_i7-9700te_firmware -
intel core_i7-9750h_firmware -
intel core_i7-9750hf_firmware -
intel core_i7-9800x_firmware -
intel core_i7-9850h_firmware -
intel core_i7-9850he_firmware -
intel core_i7-9850hl_firmware -
intel core_i9-9800x_firmware -
intel core_i9-9820x_firmware -
intel core_i9-9880h_firmware -
intel core_i9-9900_firmware -
intel core_i9-9900k_firmware -
intel core_i9-9900kf_firmware -
intel core_i9-9900ks_firmware -
intel core_i9-9900t_firmware -
intel core_i9-9900x_firmware -
intel core_i9-9920x_firmware -
intel core_i9-9940x_firmware -
intel core_i9-9960x_firmware -
intel core_i9-9980hk_firmware -
intel core_i9-9980xe_firmware -
intel core_i9-9980xe_firmware -
intel wi-fi_6_ax200 -
intel converged_security_and_manageability_engine *
intel core_i3-8000_firmware -
intel core_i3-8000t_firmware -
intel core_i3-8020_firmware -
intel core_i3-8100_firmware -
intel core_i3-8100b_firmware -
intel core_i3-8100h_firmware -
intel core_i3-8100t_firmware -
intel core_i3-8109u_firmware -
intel core_i3-8120_firmware -
intel core_i3-8121u_firmware -
intel core_i3-8130u_firmware -
intel core_i3-8140u_firmware -
intel core_i3-8145u_firmware -
intel core_i3-8145ue_firmware -
intel core_i3-8300_firmware -
intel core_i3-8300t_firmware -
intel core_i3-8350k_firmware -
intel core_i5-8200y_firmware -
intel core_i5-8210y_firmware -
intel core_i5-8250u_firmware -
intel core_i5-8257u_firmware -
intel core_i5-8259u_firmware -
intel core_i5-8260u_firmware -
intel core_i5-8265u_firmware -
intel core_i5-8269u_firmware -
intel core_i5-8279u_firmware -
intel core_i5-8300h_firmware -
intel core_i5-8305g_firmware -
intel core_i5-8310y_firmware -
intel core_i5-8350u_firmware -
intel core_i5-8365u_firmware -
intel core_i5-8365ue_firmware -
intel core_i5-8400_firmware -
intel core_i5-8400b_firmware -
intel core_i5-8400h_firmware -
intel core_i5-8400t_firmware -
intel core_i5-8420_firmware -
intel core_i5-8420t_firmware -
intel core_i5-8500_firmware -
intel core_i5-8500b_firmware -
intel core_i5-8500t_firmware -
intel core_i5-8550_firmware -
intel core_i5-8550u_firmware -
intel core_i5-8600_firmware -
intel core_i5-8600k_firmware -
intel core_i5-8600t_firmware -
intel core_i5-8650_firmware -
intel core_i5-8650k_firmware -
intel core_i5-8700b_firmware -
intel core_i7-8086k_firmware -
intel core_i7-8500y_firmware -
intel core_i7-8510y_firmware -
intel core_i7-8550u_firmware -
intel core_i7-8557u_firmware -
intel core_i7-8559u_firmware -
intel core_i7-8560u_firmware -
intel core_i7-8565u_firmware -
intel core_i7-8569u_firmware -
intel core_i7-8650u_firmware -
intel core_i7-8665u_firmware -
intel core_i7-8665ue_firmware -
intel core_i7-8670_firmware -
intel core_i7-8670t_firmware -
intel core_i7-8700_firmware -
intel core_i7-8700b_firmware -
intel core_i7-8700k_firmware -
intel core_i7-8700t_firmware -
intel core_i7-8705g_firmware -
intel core_i7-8706g_firmware -
intel core_i7-8709g_firmware -
intel core_i7-8750h_firmware -
intel core_i7-8750hf_firmware -
intel core_i7-8809g_firmware -
intel core_i7-8850h_firmware -
intel core_i9-8950hk_firmware -
intel wi-fi_6_ax200 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer_wifi_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D0A60D-A406-4381-AF97-F43C09958373",
              "versionEndExcluding": "3.1122.3158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F65B54B-348E-4868-A53D-27C404F8B398",
              "versionEndExcluding": "22.140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_wifi_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D6EBDE-96E0-4446-A8D1-16502969D82B",
              "versionEndExcluding": "2.2.14.22176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E174EDF7-FBDB-411E-B05E-EF48FF0734D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C7F1E8-9939-452B-B166-35F4CAC73F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C25171-A7D3-4C99-B5A1-2EB81D595396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BA0FB5-002D-4556-BF7E-BD5D5E68B451",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33703EA-B5EF-41FF-8C5F-95F750D5387E",
              "versionEndExcluding": "16.1.25.1885v2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE550D6B-5197-461E-9F5B-295AB7F0BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C0C60C-7CF4-4A14-82F1-F0E574F7435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6954078-D47E-4E54-8CDB-1CCF4EE09C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E28C4D-97DC-4D75-A527-5D3606305B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14957D81-CB3A-4C3F-A88B-E2EEAA9ABB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C89A0-CC1C-49EE-B10D-63B98C00F3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB76AA51-27B9-4542-9E69-CA98FC7AC1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3D0F83-B6B8-42ED-91E6-D7626F03F2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCCF50F-9ABA-4A3D-B10C-15FA30720560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C973EA-12D7-4CF0-B343-4BE188DCDA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA543A5B-2DB1-484E-8C10-72B2D7483AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1105DE29-E206-4CA3-9D65-F36D96836F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "726420C9-2E0C-4B33-B5E0-D9C9DC9120D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6020A1-F88B-4903-984E-E394C8455518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE81AD5E-7D46-4534-A0E2-0A988B91325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C9476-CBC1-4D9E-A9C3-5443C8864F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51E74CB-FA01-4D78-85FE-3C17945E4FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B2F36D-369D-44A8-85B2-E75E7204D33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5855F355-5BA9-4EB6-922A-D2DAE5002247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDD387-B4BA-4403-B468-718B11E4D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D124457-2879-47F6-892D-76A4D94D1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A00C1C5-8F0D-45E7-B6FB-8D588D400F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CD143-5B44-49ED-A958-EB01E3606292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B66DA2-62B0-4267-8F9B-820CD1944927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F5DA6C-FEB5-48C3-BF66-F3352F2C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CDCE12-01E6-45DA-B72E-1BE4150BF1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0363669-1973-497A-A7BD-CEC197AEB224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E91FC7C-A392-4CEF-8AE8-8052F5153F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4500975-3845-443F-A67D-93B57324F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76AD3-58B6-4250-97CA-4D7DA77239D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC345E7-58DA-4A7C-9597-D94C2137E128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5E2BA7-DE2B-4357-8438-E812C81F568B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6B92D7-5FF4-4171-AB1F-46C94E48BC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A9DA1-A6EE-4E0A-BD4A-693CB01F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C0C316-08A1-492A-ACB4-9CAC6C66583E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A0388B-1227-4D61-AB19-145E725E2673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46779A84-F8E4-4AFC-8B93-A60CD31B3511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA30873-0BF9-4D36-ABFD-9AF14C104B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0402CD-AC88-4C2B-9CC1-EA9ED953DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8F0737-3F6C-4FBD-A3B5-23580E93041F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E05F6-E2DF-49C8-97D2-2978602C564C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440BD75-463D-4FB5-A0E8-F9992D5E604F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF771F3-E51D-44C8-A354-1989114899C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEC1232-ED43-48C8-BF9D-8AC5F97220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4066C0-0E3D-4181-8093-FB4B68AAE7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A030112-DE68-4596-A91C-7FD0B11770BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A160216C-95AD-42A7-9532-E1EA97A7CBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03484640-6AFE-425C-90A0-0AF5C5F3D92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3595DC8A-DA7A-4C2A-80A6-40FDBC87053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA5C2F-6184-4FAA-919F-EAA4E95458B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F7A967-B433-46C8-9742-47C073D59F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13A666A-B39F-4359-A638-29B6F0EBBB83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEAA993-1F40-4045-B1A8-6D1995F7D057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88759768-F065-4959-AA26-0F14AC2BEB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541B4AC-CF73-452D-9489-91ECCDFE7F33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3735297F-E6FE-4AB6-80BD-E498F84E32C1",
              "versionEndExcluding": "16.1.25.1865v6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE550D6B-5197-461E-9F5B-295AB7F0BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C0C60C-7CF4-4A14-82F1-F0E574F7435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6954078-D47E-4E54-8CDB-1CCF4EE09C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E28C4D-97DC-4D75-A527-5D3606305B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14957D81-CB3A-4C3F-A88B-E2EEAA9ABB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C89A0-CC1C-49EE-B10D-63B98C00F3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB76AA51-27B9-4542-9E69-CA98FC7AC1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3D0F83-B6B8-42ED-91E6-D7626F03F2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCCF50F-9ABA-4A3D-B10C-15FA30720560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C973EA-12D7-4CF0-B343-4BE188DCDA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA543A5B-2DB1-484E-8C10-72B2D7483AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1105DE29-E206-4CA3-9D65-F36D96836F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "726420C9-2E0C-4B33-B5E0-D9C9DC9120D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6020A1-F88B-4903-984E-E394C8455518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE81AD5E-7D46-4534-A0E2-0A988B91325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C9476-CBC1-4D9E-A9C3-5443C8864F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51E74CB-FA01-4D78-85FE-3C17945E4FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B2F36D-369D-44A8-85B2-E75E7204D33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5855F355-5BA9-4EB6-922A-D2DAE5002247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDD387-B4BA-4403-B468-718B11E4D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D124457-2879-47F6-892D-76A4D94D1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A00C1C5-8F0D-45E7-B6FB-8D588D400F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CD143-5B44-49ED-A958-EB01E3606292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B66DA2-62B0-4267-8F9B-820CD1944927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F5DA6C-FEB5-48C3-BF66-F3352F2C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CDCE12-01E6-45DA-B72E-1BE4150BF1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0363669-1973-497A-A7BD-CEC197AEB224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E91FC7C-A392-4CEF-8AE8-8052F5153F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4500975-3845-443F-A67D-93B57324F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76AD3-58B6-4250-97CA-4D7DA77239D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC345E7-58DA-4A7C-9597-D94C2137E128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5E2BA7-DE2B-4357-8438-E812C81F568B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6B92D7-5FF4-4171-AB1F-46C94E48BC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A9DA1-A6EE-4E0A-BD4A-693CB01F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C0C316-08A1-492A-ACB4-9CAC6C66583E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A0388B-1227-4D61-AB19-145E725E2673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46779A84-F8E4-4AFC-8B93-A60CD31B3511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA30873-0BF9-4D36-ABFD-9AF14C104B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0402CD-AC88-4C2B-9CC1-EA9ED953DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8F0737-3F6C-4FBD-A3B5-23580E93041F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E05F6-E2DF-49C8-97D2-2978602C564C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440BD75-463D-4FB5-A0E8-F9992D5E604F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF771F3-E51D-44C8-A354-1989114899C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEC1232-ED43-48C8-BF9D-8AC5F97220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4066C0-0E3D-4181-8093-FB4B68AAE7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A030112-DE68-4596-A91C-7FD0B11770BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A160216C-95AD-42A7-9532-E1EA97A7CBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03484640-6AFE-425C-90A0-0AF5C5F3D92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3595DC8A-DA7A-4C2A-80A6-40FDBC87053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA5C2F-6184-4FAA-919F-EAA4E95458B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F7A967-B433-46C8-9742-47C073D59F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13A666A-B39F-4359-A638-29B6F0EBBB83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEAA993-1F40-4045-B1A8-6D1995F7D057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88759768-F065-4959-AA26-0F14AC2BEB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541B4AC-CF73-452D-9489-91ECCDFE7F33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77359153-675C-47D3-9A00-0BAD9BE26CD8",
              "versionEndExcluding": "15.0.42.2235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-11100b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0464200B-C3A6-40ED-8261-DBA638484CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90291EE5-655A-4298-AF37-919EA2BC37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CD246D-3703-45A3-9CD2-17039A3B6C96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CFB83C-DB26-4E52-AF8A-ADB6839BDD8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C8E57-7E8B-4494-BE0E-E268AB2E4339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372ADB3F-1D20-442A-BCBE-87A41A71093D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E4714A-A1CF-492C-8553-584A41CA5B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE27BBD-F5C0-47FD-82CB-EF9763DF2866",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A331C0CA-06E5-4C46-91C4-1444780BC2DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69676C95-DB91-4FF2-B3F1-83E95FE84ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99645C51-90F3-4BDA-B9D4-AF747947481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE65B5E-60C0-47FD-B47A-12084959D291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36840EC4-CA42-40B5-8D0E-9CCE86B1A7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DC8DC6-15AF-4DB0-9A6A-4691FC9D86E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A36BB6-4EDD-4FF9-8786-C2A902C90C9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "427BE96A-0265-4979-8204-D555E601C519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2479723B-92C8-4C15-8766-DB7E1A911BD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18C4D03-8736-48E6-9A91-5D71C2D95AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "844B344E-FA5C-4E66-A7F0-99993CD20ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A7B207-2E2C-47DC-9DFD-AF98BA108B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5B827C-FA90-4435-8BC1-78362D79C289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0362D029-F6A8-4A21-A31D-FDB51293928A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A432D21-B015-4F5A-8726-AE506CC490FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "490D9F4F-E489-4502-9194-2EDA44E70F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F19AC344-835E-468B-9FB5-AB64A8A7E9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "720B135D-36C4-4204-A964-7D71DCFAAF29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED643C3A-84A6-4ED0-8A6F-DE160DA93B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3622470-6979-4438-8BDF-549CC339D417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D00D974-CBA7-4362-AF2F-042D15AC9790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24D3685-6DCA-40D0-8437-B0241A7597ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1089BC24-D092-41FE-8AA5-5742301B99AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E5C4F73-01EC-4396-BDE2-1ACE9E9C8C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80415BA-0D9A-4B96-9BDF-52A45DF82046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9371D656-8665-4D04-93E6-CF9476546BED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EE2586-A95C-4785-A264-39D30D4587E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A2043A3-466C-4142-9B2B-E63D6119ED09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E22745-5399-4CFD-8C4F-4DA52829DB2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "341575DD-4D03-44AC-8DE0-EA2A4768ABD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "579F1B28-1D6A-48DE-ABAB-398198224959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81805C4E-8192-4719-8F3C-6BD8C77E1B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2FF3DD-0986-4FB6-B17B-0AEFB0899672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C4FD26-557D-47F8-9E1C-D337ACDDF51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1327CC4-7F1D-422F-BD11-099D2DC18352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B522B4F-03D8-4BB8-920E-7847298EF9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF74D5F6-E3F3-40F5-823B-6814458CC541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B89D3F9-351C-4A0D-BD11-1BBE5ABD6B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C114D88-9FC8-4E43-8DD5-CA9618CDC9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58712583-BA04-409D-A43D-AAE4CAC2DC64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E06CE46-0FF7-4831-87B6-FA1EB958CF94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5814CF55-8867-445E-BE1E-795006B0E306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C17F5F-C6AE-4A7C-ACA0-1E8426ADC745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AD8E5F-BA66-4628-ACF0-1891588C0DBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED61822-778A-41FE-A85D-A44D300F800C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04975FEA-10AE-4E5A-A69D-553EE641D18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "609B3A40-365A-42EE-B1A1-CF73CD41AFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900kb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E481B14-0DEC-4176-B95A-EF53A05D4703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB27F8F4-9A4B-49B4-9286-4D209FBA8961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BFA38A-1059-4607-9CDC-F90DF7B90E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EB1527-0F25-422C-927D-0ED5924EA83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89B3F38-F128-4173-9DF4-2B5CC5786648",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51195995-2CB8-4978-B38B-B49E50F6B60C",
              "versionEndExcluding": "14.1.67.2046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75921058-8E13-460F-9F74-AF9C21DF353A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDD752C-BE5E-4EE7-9541-CAE85E5E237A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000ng4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070EC3E9-B224-49F4-94D5-8A18AD47EBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E2359B-38A9-4962-B819-1C438390BF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA80297-A747-45A0-81EA-2367F2D88053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "128AF2E8-0FDD-42FA-9F3A-7939E1D06389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BFE70F-8E5F-46C8-8675-3D5C114BF98A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E324A6-6F59-47A2-A941-3CEB70F5B70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73917CEB-A661-4E21-ADB5-2F7C545F937A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB644F0-D66B-4CE6-96A5-5AE895FC0315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88A42CB-3AD3-4621-AA0D-F24636DA9903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD66BFB8-0725-408E-B7C8-9EE2FB5EE1CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33FA193-AA3B-439D-94D4-060172C7D371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE22EAE0-A356-4194-9287-FE70FCE16135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FECACD-46EF-4DBE-ACA9-D0FB9311FCF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE6184E-9929-4F23-8834-9B0E15A4131D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6544E460-1B23-43B5-92A4-13CF61AF08A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6228E-13A2-47CF-87B4-CB34A1FA4B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F130A798-2FCC-43DB-9A42-367C4BB580E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D72A6E-AAEA-49A8-92D8-FFED7220E263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F542B269-6281-47C4-86CE-72BC9180D90E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F74DD9E-0D1F-44B9-B3CB-7F85F4E540B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "646F0510-9532-466C-B43B-8E869384A52E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA03DCF-A603-41F8-A38B-6757BFA270FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96CA5B1-ED93-4423-9C4C-EFCB3F63767A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "530E334B-4B32-4F96-B67B-194A7B46E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ECE587-9DC0-4989-97AC-DD2B7EEAE7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DA87ECA-F5EC-42A5-8A43-6D47242A2756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3F8BD6-027E-4A6A-B7FC-99443BC13A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "255A4636-57B9-491E-B213-02E3B4EFB6B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "150F855A-EC0D-483F-99A8-DDD33AAE1F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "497FAB39-DA53-4447-B1FC-144C725135D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2115591-782B-492C-9A43-1EF612309E6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BC109D-F210-4BB0-80B1-BC877F322E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA43369-7A3F-45F4-B45C-0435499336CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388D5427-0439-4F89-9D80-3AEDB853B2CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E50D6E-C759-46F4-A794-5DD83E971BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AA0B0A-19E2-4F4B-B1E1-09F4DFED737B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21EAC0D6-D5E2-42D6-B105-BCF09C35BC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3548B071-7C6E-402D-8292-84E1400BDC07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10610u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB122B67-2D59-445D-855E-6C79A385DE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED7ED67-CE89-4585-A146-E9B1C5CFFCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1060ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92A3211-DD20-49BA-A1DA-615D823A42A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C752B58-0750-4487-845B-9D657079BDED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA13A2D-14CE-4C48-A746-E6068BA343EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA2457A-D89A-4F3E-95D3-3C839F3C0365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A6D39D-7897-48E4-BEB3-7D71E8E42EEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95AC35A3-6F6D-4F61-872E-6E73F958449B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD3DB08-E718-4A66-A1AC-B31FA97E42C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E029771-4205-49E6-9635-E03A66F877FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9D6D38-180E-4CD1-B6A6-765E67DF97B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D41E4EDE-51B2-4618-AD9B-AEDF07D47775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B232700-BC3E-49B0-9814-FB37958B6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85113D54-52E5-4372-8FD5-DC37DCBE9DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "215576B4-3ABA-4F65-8DA4-F07C1750C99B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBEEB17-29AB-4F3A-A0CC-68386A315050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA7D248-0833-44D6-81A6-FFD24E54AE80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB36606-33D0-42DF-A7B5-ED4E5E7061A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E412013-D537-4E86-AA5C-08016531405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CF9E46-7F23-4910-B09C-E2BADDC793B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B82BF5-F105-4686-A352-6BDD7FB2DC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF885F34-941A-4147-B755-3260A22A6825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C04E06-708E-4103-9238-A7451189DBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6428C73-6A64-4619-983F-3871B4CE1472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "576C6801-0DBF-4D1C-B5CF-55E25BDFFD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "465D3B92-2BC3-4F0A-A792-564361B2A1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "916A238A-64B9-483C-A0FB-8144B4D5EFFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE472FC-4776-4FD1-AE36-3D9934A60BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10910_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5351528-6FC1-4CA4-82E8-BC252A950B34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "470B28CA-4990-4AF8-9CF5-C2A1B037FFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F8E079-4941-4878-8DC3-4B74BD832724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4648D9A9-4050-4753-A7B3-E56C0F7E22F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8583AC-0D66-466C-8024-15A520803534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAD995C-5D8D-4FE1-91BF-45FF893E7C0C",
              "versionEndExcluding": "12.0.92.2145v3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B8A8CC-9009-4CF0-894F-97079FD27796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62EB1BA-2704-4A4D-BA6D-F8BFE748D0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E4F07F-B972-423F-BCFF-E27B3207B493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2908EB-97F4-4DAE-802F-1011FD2587DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD20B8F2-FCD6-454F-955F-9F59B140593C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6FA4984-0018-40A5-99F8-C6FF809F9494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9130u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F454B00-67EF-468A-88DA-C98C67FC0942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "196BA038-162F-4E30-8DE3-6FFB35102A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769E9A01-C94B-4254-8510-ABE32567E22D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC85FC5-274A-43B1-A9B6-245130812551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777DB8E3-3958-40F0-BF2D-B319F9FA3795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E9BA09-E255-438E-9938-3F51A78A3331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BFA4824-F934-4602-A6ED-A14B602A4575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4DDD41-51CD-40FF-BCB0-29D559C1CAD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95AB3F9-7B28-46F8-8882-4976DBBCC767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF61383-1558-4AE6-97ED-3B8A20667EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C646A5D0-1A9D-4E65-AC62-070959C38CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "060B891D-A885-4BE5-B4C4-3384CBBF2B28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE853A14-BAA9-4B48-8B0A-F5DAE8D051CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F5E016-5AB5-4DB5-BDB0-75AE14253413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662A5846-DA15-431B-9392-F0BA5457FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "199A5D61-EB42-4C3C-9344-4CA497358D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1163CF40-4D70-4965-8229-B102D754ECD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FD2F07-6CD0-4708-8D11-3BA0AEFD5271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455BC769-5B19-4B91-844B-15B4FB2401E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "027639C1-CA74-4F02-98E3-9C93E71DD7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "581CCD85-F9BA-4AE0-8FCD-4118C13C1080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66250BC-0338-40E8-9E9F-706F2DA5E5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E48F04-9B55-4162-BB28-07FFD3D5194D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E50CC66-0FC3-4825-B677-EBF34D6804B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A12922-9D6D-49E8-B9C6-DD74CD60FAFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "165E3D96-24EA-4F47-9692-30823C482BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E86ACD76-A1A6-4B99-A521-38C706AF2EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82BAF85-06A9-4AEE-94D2-3CAF4607623E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*",
              "matchCriteriaId": "5C281835-B593-4824-A061-F042409D855C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAD995C-5D8D-4FE1-91BF-45FF893E7C0C",
              "versionEndExcluding": "12.0.92.2145v3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FEAC4F-B30C-44E2-B7A1-BA4367334008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8000t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC60BA46-EA85-45A4-8C9A-2FD49C2CD9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8020_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACC9389-15BB-4AE3-A3EF-9F36D0D54230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6325AFF1-8B27-408C-ADC3-E1FA826A2B9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D96F9D-50ED-47B4-9DC9-1C6807C70129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "792B6DC2-0EE1-486E-B44A-F0971C12B1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9147C908-0B5E-4CC4-BFDA-FDC8219494A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CAE5F9-E9D5-4EE1-A02D-88707B118C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "071E5109-EDDC-47DA-85DA-84AE102386F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8121u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4801359-0950-4DED-A394-512737A263DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB32980-A87F-4AC6-9F1C-EA690582DECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E786A817-3F20-4DB9-BC86-EF0AEC3C131F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1100AAC2-5A94-4EF3-AB94-AB4B4085F109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17773338-62E3-4F05-86D1-7E3D157C78C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30904062-0998-4D93-8F61-36C41BCD11F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC25F057-A548-4E02-A464-8AE97B40A39D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F99AFDF6-1B9C-4F06-A827-F0C5052EA485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9C3DCA2-6087-4286-A84A-6091149083C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "813C2CF3-2370-4FC9-86F1-85FA6597EDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C71C3D-D137-4302-8B35-3A2AA08DD92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444C585D-8DAD-4D4E-99CB-23B38A2F2561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2797768-C460-4901-99BE-148A7BADC020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CAAFA25-2328-4B29-8B4C-CAA34A3F07DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7001A74-CFF9-4CBB-A72B-E476C22ADF07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F1036B8-CB05-4DC5-AB07-ACCC6351B9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E3236A7-F174-4A47-90B3-7E0457CB3455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CF5BB43-9A54-4F8F-86EB-04B56135F69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE8EAB7-E619-4140-9FF2-F01DD57DD286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DB74AB-9D98-40B0-9715-EF934125C228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D6D69D-3EA5-4F5A-A64E-E561994BC7A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4ECE37-14C8-4035-9410-F66AF586934D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDC571E-D4F4-4837-9462-781B9085DDA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8420_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4D7564-46B9-4B1D-9B43-D539BBFE1AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8420t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "457FF494-B454-4DC7-A311-711C817905FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4B23DC-BB43-4BF2-B96A-3A531EC603C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495C794A-3EB2-4C2B-8312-65C1C70EFFAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "382FEC53-468F-41B4-A639-5875F6C62DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCDBD532-C038-4C69-841F-DC4B09F5A99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4079D92-EF02-4003-B8B0-0EFD4DCAF8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5BEE28-D0F7-44F0-8B01-69EEF249FDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB2544C-BD41-4316-BDAD-30B4DDF785EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD242386-919B-4B0C-A7C9-D045C0977FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB634C16-35A0-43D5-98D7-B60E7097B732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8650k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13EB04A-F81C-4956-9324-6D972D4CC3D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD0F061-1664-4C0C-9207-8991C6F79F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8510y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5164EB-8ED3-4FB3-8B90-F5FEAD490D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B60A1C2-D6E2-43B3-967C-746CDC2F96CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7600A08-3EA6-4A3D-8B5E-5F0C5E6A7E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "942B77AD-CEA4-4A9F-B748-155916A4917A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54606FA5-02CE-43C5-9153-FB1070E9DD15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8670_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372261C6-7E3B-40DC-95EB-E4AC6926F3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8670t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC5EA2EC-2707-484F-AC5E-40BCAD09D7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "881A1690-F94A-41E4-9F38-BAD170153B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB18769-9DDD-4321-B123-BFF81A02DA4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos productos Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi y Killer(TM) WiFi puede permitir que usuarios no autenticados habiliten potencialmente la Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2022-26047",
  "lastModified": "2024-11-21T06:53:21.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-11T16:15:12.333",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-15 17:15
Modified
2024-11-21 04:53
Summary
Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "992196CF-5919-4B00-9D1E-879BD5B61B54",
              "versionEndExcluding": "21.70.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C0FFFB-536F-4F4E-9CEA-A38BA0912045",
              "versionEndExcluding": "20.70.16.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAFE5490-D953-4B1C-9E2C-20F31C81FD59",
              "versionEndExcluding": "19.51.27.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Los permisos heredados no seguros en los productos Intel\u00ae PROSet/Wireless WiFi versiones anteriores a la versi\u00f3n  21.70, en Windows 10 pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local."
    }
  ],
  "id": "CVE-2020-0557",
  "lastModified": "2024-11-21T04:53:45.380",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-15T17:15:13.937",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 06:56
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF26EB8-A731-4186-9338-1B2873A61D8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7769243A-AD4D-47AB-AC83-2E6EA9E040C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675x\\/w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28382BCE-0FF3-44AC-97C2-E74BB17F1C3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D37D73-C613-4800-B414-8AC9A32AD5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC34DCD7-D31D-411D-859E-75617C9E2201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado para algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local."
    }
  ],
  "id": "CVE-2022-27635",
  "lastModified": "2024-11-21T06:56:04.033",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:11.817",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:22
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF26EB8-A731-4186-9338-1B2873A61D8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7769243A-AD4D-47AB-AC83-2E6EA9E040C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675x\\/w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28382BCE-0FF3-44AC-97C2-E74BB17F1C3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5D37D73-C613-4800-B414-8AC9A32AD5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550i\\/s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC34DCD7-D31D-411D-859E-75617C9E2201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado para algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local."
    }
  ],
  "id": "CVE-2022-40964",
  "lastModified": "2024-11-21T07:22:19.010",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.9,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 5.8,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:14.603",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF2BECB-7E4A-4E9C-BAC3-8C48FAD49AD8",
              "versionEndExcluding": "21.110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n inapropiada de la entrada en algunos productos Intel\u00ae PROSet/Wireless WiFi anterior a versi\u00f3n 21.110, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-12314",
  "lastModified": "2024-11-21T04:59:30.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-12T18:15:14.237",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-06-13 16:29
Modified
2024-11-21 04:16
Summary
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
secure@intel.comhttp://jvn.jp/en/jp/JVN75617741/index.html
secure@intel.comhttp://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
secure@intel.comhttp://www.securityfocus.com/bid/108777Third Party Advisory, VDB Entry
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
secure@intel.comhttps://support.lenovo.com/us/en/product_security/LEN-27828Third Party Advisory
secure@intel.comhttps://usn.ubuntu.com/4115-1/
secure@intel.comhttps://usn.ubuntu.com/4118-1/
secure@intel.comhttps://usn.ubuntu.com/4145-1/
secure@intel.comhttps://usn.ubuntu.com/4147-1/
secure@intel.comhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN75617741/index.html
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/108777Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
af854a3a-2127-422b-91ae-364da2661108https://support.lenovo.com/us/en/product_security/LEN-27828Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4115-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4118-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4145-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4147-1/
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9196C96F-3600-4D46-81F4-A1F69887323B",
              "versionEndExcluding": "21.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso insuficiente en el controlador del software PROSet/Wireless WiFi de Intel\u00ae anterior a versi\u00f3n 21.10, puede permitir a un usuario no autenticado habilitar potencialmente la denegaci\u00f3n de servicio por medio del acceso adyacente."
    }
  ],
  "id": "CVE-2019-0136",
  "lastModified": "2024-11-21T04:16:18.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-06-13T16:29:00.763",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "http://jvn.jp/en/jp/JVN75617741/index.html"
    },
    {
      "source": "secure@intel.com",
      "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108777"
    },
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.lenovo.com/us/en/product_security/LEN-27828"
    },
    {
      "source": "secure@intel.com",
      "url": "https://usn.ubuntu.com/4115-1/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://usn.ubuntu.com/4118-1/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://usn.ubuntu.com/4145-1/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://usn.ubuntu.com/4147-1/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN75617741/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108777"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.lenovo.com/us/en/product_security/LEN-27828"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/4115-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/4118-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/4145-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/4147-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:30
Summary
Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un fallo en el mecanismo de protecci\u00f3n de algunos software de Intel(R) PROSet/Wireless WiFi puede permitir que un usuario con privilegios habilite potencialmente una escalada de privilegios mediante acceso local."
    }
  ],
  "id": "CVE-2022-46329",
  "lastModified": "2024-11-21T07:30:23.953",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:16.540",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-693"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "898671D5-38BA-4822-8C9B-68E871BFC0BE",
              "versionEndExcluding": "21.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Los permisos de directorio inapropiados en Intel\u00ae PROSet/Wireless WiFi Software versiones anteriores a la versi\u00f3n  21.40, puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio y una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11154",
  "lastModified": "2024-11-21T04:20:38.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.520",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:12
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "575B6D56-BF5F-4D79-A3D4-253BC199B483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax203:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7B5478E-CE97-4514-A054-8BE1871623AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2022-36351",
  "lastModified": "2024-11-21T07:12:50.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:12.807",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:55
Summary
Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel proset\/wireless_wifi *
microsoft windows -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F49E398F-DCA2-4584-BB56-3EF5A297ED8B",
              "versionEndExcluding": "22.220.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in firmware for some Intel(R) PROSet/Wireless WiFi software for Windows before version 22.220 HF (Hot Fix) may allow a privileged user to potentially enable escalation of privilege via local access."
    }
  ],
  "id": "CVE-2023-28714",
  "lastModified": "2024-11-21T07:55:51.683",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:25.880",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00872.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Summary
Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF2BECB-7E4A-4E9C-BAC3-8C48FAD49AD8",
              "versionEndExcluding": "21.110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una restricci\u00f3n inapropiada del b\u00fafer en algunos productos Intel\u00ae PROSet/Wireless WiFi anterior a versi\u00f3n 21.110, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-12317",
  "lastModified": "2024-11-21T04:59:30.307",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-12T18:15:14.317",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Summary
Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF2BECB-7E4A-4E9C-BAC3-8C48FAD49AD8",
              "versionEndExcluding": "21.110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un fallo en el mecanismo de protecci\u00f3n en algunos productos Intel\u00ae PROSet/Wireless WiFi anterior a versi\u00f3n 21.110, puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-12318",
  "lastModified": "2024-11-21T04:59:30.403",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-12T18:15:14.393",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:15
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario autenticado habilite potencialmente una escalada de privilegios mediante acceso local."
    }
  ],
  "id": "CVE-2022-38076",
  "lastModified": "2024-11-21T07:15:43.863",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.8,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:13.843",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-17 14:15
Modified
2024-11-21 05:14
Summary
Incomplete cleanup in some Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers before version 22.0 may allow a privileged user to potentially enable information disclosure and denial of service<b>&nbsp;</b>via adjacent access.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8EB57D-A52E-4D12-8B1D-B8142B9103A9",
              "versionEndExcluding": "22.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A11E55E8-5FA9-4ED7-AB61-03F22EE1759B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E89EB0D-233A-486A-BDAE-F5726432CD7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9903E2E-A670-40D4-8B9F-D2C0CFDBFC9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4649D446-130B-4B31-B9ED-BA7F9F7EEB8F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53CA56F3-21D9-4469-B698-4F9C2B662624",
              "versionEndExcluding": "22.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12419474-DB56-462D-9116-3614A4BBAF20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B944F7-4A5F-41D0-A910-6F978F66CAA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incomplete cleanup in some Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers before version 22.0 may allow a privileged user to potentially enable information disclosure and denial of service\u003cb\u003e\u0026nbsp;\u003c/b\u003evia adjacent access."
    },
    {
      "lang": "es",
      "value": "Una limpieza incompleta en algunos controladores Intel\u00ae PROSet/Wireless WiFi and Killer\u2122 versi\u00f3n anterior a 22.0, puede permitir a un usuario privilegiado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n y denegaci\u00f3n de servicio (b)\u0026#xa0;(/b) por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-24458",
  "lastModified": "2024-11-21T05:14:51.870",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.1,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 4.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-17T14:15:16.547",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00448.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00448.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-459"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-13 20:15
Modified
2024-11-21 04:59
Summary
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF2BECB-7E4A-4E9C-BAC3-8C48FAD49AD8",
              "versionEndExcluding": "21.110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una administraci\u00f3n de flujo de control insuficiente en algunos productos Intel\u00ae  PROSet/Wireless WiFi versiones anteriores a 21.110, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-12313",
  "lastModified": "2024-11-21T04:59:29.907",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-13T20:15:15.943",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "898671D5-38BA-4822-8C9B-68E871BFC0BE",
              "versionEndExcluding": "21.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Los permisos de directorio inapropiados en Intel\u00ae PROSet/Wireless WiFi Software versiones anteriores a la versi\u00f3n 21.40, puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio y una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11155",
  "lastModified": "2024-11-21T04:20:38.120",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.567",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-15 17:15
Modified
2024-11-21 04:53
Summary
Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "992196CF-5919-4B00-9D1E-879BD5B61B54",
              "versionEndExcluding": "21.70.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C0FFFB-536F-4F4E-9CEA-A38BA0912045",
              "versionEndExcluding": "20.70.16.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAFE5490-D953-4B1C-9E2C-20F31C81FD59",
              "versionEndExcluding": "19.51.27.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones inapropiadas del b\u00fafer en el controlador del modo kernel para los productos Intel\u00ae PROSet/Wireless WiFi versiones anteriores a la versi\u00f3n 21.70 en Windows 10, pueden permitir a un usuario no privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente."
    }
  ],
  "id": "CVE-2020-0558",
  "lastModified": "2024-11-21T04:53:45.497",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-15T17:15:14.000",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Summary
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF2BECB-7E4A-4E9C-BAC3-8C48FAD49AD8",
              "versionEndExcluding": "21.110",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una administraci\u00f3n del flujo de control insuficiente en algunos productos Intel\u00ae PROSet/Wireless WiFi anterior a versi\u00f3n 21.110, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-12319",
  "lastModified": "2024-11-21T04:59:30.503",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-12T18:15:14.457",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:05
Summary
Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel proset\/wireless_wifi *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "691E5865-674B-407F-936D-F50F6FF3B5BE",
              "versionEndIncluding": "20.100",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Los permisos de directorio inapropiados en el instalador para el programa Intel (R) PROSet / Wireless WiFi versi\u00f3n 20.100 y anteriores pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2018-3701",
  "lastModified": "2024-11-21T04:05:54.890",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-17T16:29:00.737",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "http://www.securityfocus.com/bid/108387"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K00245734"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/us/en/product_security/LEN-27701"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/108387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K00245734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/us/en/product_security/LEN-27701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00204.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "898671D5-38BA-4822-8C9B-68E871BFC0BE",
              "versionEndExcluding": "21.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Los errores l\u00f3gicos en Intel\u00ae PROSet/Wireless WiFi Software versiones anteriores a la versi\u00f3n  21.40, puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios, una denegaci\u00f3n de servicio y una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11156",
  "lastModified": "2024-11-21T04:20:38.227",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.630",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}