CVE-2022-38076

EUVD-2022-40679
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.8 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
intelCNA
3.8 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
Affected Products (NVD)
VendorProductVersion
intelkiller
𝑥
< 34.22.1163
intelproset\/wireless_wifi
𝑥
< 22.200
inteluefi_firmware
𝑥
< 3.2.20.23023
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firmware-nonfree
bookworm
ignored
bookworm/non-free-firmware
vulnerable
bullseye
no-dsa
bullseye/non-free
vulnerable
sid/non-free-firmware
20240909-2
fixed
trixie/non-free-firmware
20240909-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux-firmware
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
needs-triage
xenial
needs-triage