CVE-2023-28374Improper Input Validation in Intel Killer

Severity
6.5MEDIUMNVD
CNA6.1
EPSS
0.1%
top 79.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateOct 29

Description

Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDintel/proset_wireless< 22.240
NVDintel/killer< 3.1423.712

🔴Vulnerability Details

3
GHSA
GHSA-cvcv-6ggr-f8x8: Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 222024-10-29
OSV
CVE-2023-28374: Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 222024-02-14
CVEList
CVE-2023-28374: Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 222024-02-14
CVE-2023-28374 — Improper Input Validation in Intel | cvebase