CVE-2022-36351

Severity
6.5MEDIUM
EPSS
0.1%
top 75.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 11

Description

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages5 packages

NVDintel/killer< 34.22.1163
NVDintel/uefi_firmware< 3.2.20.23023
Debianfirmware-nonfree< 20240610-1+1

Also affects: Debian Linux 10.0, Fedora 37, 38, 39

Patches

🔴Vulnerability Details

3
CVEList
CVE-2022-36351: Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable d2023-08-11
OSV
CVE-2022-36351: Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable d2023-08-11
GHSA
GHSA-vxgp-5w4f-87hm: Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable d2023-08-11

📋Vendor Advisories

2
Red Hat
hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi2023-08-08
Debian
CVE-2022-36351: firmware-nonfree - Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) W...2022
CVE-2022-36351 (MEDIUM CVSS 6.5) | Improper input validation in some I | cvebase.io