CVE-2022-46329

CWE-6936 documents6 sources
Severity
6.7MEDIUM
EPSS
0.0%
top 91.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 11

Description

Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages5 packages

CVEListV5intel(r)_proset/wireless_wifi_softwareSee references
NVDintel/killer< 34.22.1163
NVDintel/uefi_firmware< 3.2.20.23023
Debianfirmware-nonfree< 20240610-1+1

Also affects: Debian Linux 10.0, Fedora 37, 38, 39

Patches

🔴Vulnerability Details

3
GHSA
GHSA-8r5h-8rgj-gp3x: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege2023-08-11
CVEList
CVE-2022-46329: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege2023-08-11
OSV
CVE-2022-46329: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege2023-08-11

📋Vendor Advisories

2
Red Hat
hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi2023-08-08
Debian
CVE-2022-46329: firmware-nonfree - Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may...2022
CVE-2022-46329 (MEDIUM CVSS 6.7) | Protection mechanism failure for so | cvebase.io