CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
Protection mechanism failure for some Intelยฎ PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
Vendor | Product | Version | CPE |
---|---|---|---|
intel | killer | * | cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:* |
intel | proset\/wireless_wifi | * | cpe:2.3:a:intel:proset\/wireless_wifi:*:*:*:*:*:*:*:* |
intel | uefi_firmware | * | cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:* |
intel | wi-fi_6_ax201 | - | cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:* |
fedoraproject | fedora | 37 | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
fedoraproject | fedora | 38 | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
fedoraproject | fedora | 39 | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
debian | debian_linux | 10.0 | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "Intel(R) PROSet/Wireless WiFi software",
"versions": [
{
"version": "See references",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
lists.debian.org/debian-lts-announce/2023/09/msg00043.html
lists.fedoraproject.org/archives/list/[email protected]/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/
lists.fedoraproject.org/archives/list/[email protected]/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/
lists.fedoraproject.org/archives/list/[email protected]/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/