CVE-2023-38417 — Improper Input Validation in Proset Wireless Wifi Software

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 98.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages1 packages

â–¶CVEListV5intel_proset/wireless_wifi_softwarebefore version 23.20

🔴Vulnerability Details

3
GHSA
GHSA-8h5q-j6hj-qf25: Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23↗2024-05-16
â–¶
OSV
CVE-2023-38417: Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23↗2024-05-16
â–¶
CVEList
CVE-2023-38417: Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23↗2024-05-16
â–¶

📋Vendor Advisories

1
Debian
CVE-2023-38417: firmware-nonfree - Improper input validation for some Intel(R) PROSet/Wireless WiFi software before...↗2023
â–¶
CVE-2023-38417 — Improper Input Validation | cvebase