CVE-2022-38076

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.8 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
intelCNA
3.8 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
intelkiller
𝑥
< 34.22.1163
intelproset\/wireless_wifi
𝑥
< 22.200
inteluefi_firmware
𝑥
< 3.2.20.23023
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firmware-nonfree
bullseye/non-free
vulnerable
bookworm
ignored
bookworm/non-free-firmware
vulnerable
bullseye
no-dsa
sid/non-free-firmware
20240909-2
fixed
trixie/non-free-firmware
20240909-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux-firmware
noble
needs-triage
mantic
ignored
lunar
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage