CVE-2022-21181

EUVD-2022-26422
Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
Affected Products (NVD)
VendorProductVersion
intelwireless-ac_9560_firmware
𝑥
< 22.120
intelwireless-ac_9462_firmware
𝑥
< 22.120
intelwireless-ac_9461_firmware
𝑥
< 22.120
intelkiller_ac_1550_firmware
𝑥
< 3.1122.1105
inteldual_band_wireless-ac_8260_firmware
𝑥
< 22.120
inteldual_band_wireless-ac_8265_firmware
𝑥
< 22.120
intelwireless-ac_9260_firmware
𝑥
< 22.120
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firmware-nonfree
bookworm/non-free-firmware
20230210-5
fixed
bullseye
no-dsa
bullseye/non-free
vulnerable
sid/non-free-firmware
20240909-2
fixed
trixie/non-free-firmware
20240909-2
fixed