CVE-2022-27635Improper Access Control in Intel Killer

Severity
6.7MEDIUMNVD
CNA8.2
EPSS
0.0%
top 91.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 11

Description

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages4 packages

NVDintel/killer< 34.22.1163
NVDintel/uefi_firmware< 3.2.20.23023

Also affects: Debian Linux 10.0, Fedora 37, 38, 39

Patches

🔴Vulnerability Details

3
CVEList
CVE-2022-27635: Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalati2023-08-11
OSV
CVE-2022-27635: Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalati2023-08-11
GHSA
GHSA-356g-gr7f-c28h: Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalati2023-08-11

📋Vendor Advisories

2
Red Hat
hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi2023-08-08
Debian
CVE-2022-27635: firmware-nonfree - Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) Wi...2022
CVE-2022-27635 — Improper Access Control in Intel | cvebase