Lucene search

K
intelIntel Security CenterINTEL:INTEL-SA-00766
HistoryAug 08, 2023 - 12:00 a.m.

Intel® PROSet/Wireless WiFi and KillerTM WiFi Advisory

2023-08-0800:00:00
Intel Security Center
www.intel.com
18
intel
killer
wifi
vulnerabilities
firmware
software
updates
cve-2022-27635
cve-2022-46329
cve-2022-40964
cve-2022-36351
cve-2022-38076
privilege
denial of service
uefi
ax2011
ax4111
ax2111
ax2102
wireless-ac
affected products
windows
linux
chrome os

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

30.1%

Summary:

Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege or denial of service. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities.

Vulnerability Details:

CVEID: CVE-2022-27635

Description: Improper access control for some Intel® PROSet/Wireless WiFi and Killer™ WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 8.2 High

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVEID: CVE-2022-46329

Description: Protection mechanism failure for some Intel® PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 8.2 High

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVEID: CVE-2022-40964

Description: Improper access control for some Intel® PROSet/Wireless WiFi and Killer™ WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 7.9 High

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

CVEID: CVE-2022-36351

Description: Improper input validation in some Intel® PROSet/Wireless WiFi and Killer™ WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CVSS Base Score: 4.3 Medium

CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVEID: CVE-2022-38076

Description: Improper input validation in some Intel® PROSet/Wireless WiFi and Killer™ WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 3.8 Low

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

Affected Products:

Intel® PROSet/Wireless WiFi software before version 22.200, Killer™ WiFi software before and UEFI firmware before version 3.2.20.23023 (includes versions 2.2.20.23023 and 1.2.20.23023).

CVE ID Affected Products Affected OS
CVE-2022-27635
CVE-2022-40964 Intel® Wi-Fi 6 AX2011
Intel® Wi-Fi 6E AX4111
Intel® Wi-Fi 6E AX2111
Intel® Wi-Fi 6E AX2102
Intel® Wireless-AC 95601
Intel® Wireless-AC 94621
Intel® Wireless-AC 94611 Windows 10 & 11
Linux
Chrome OS
UEFI
CVE-2022-27635
CVE-2022-40964 Killer™ Wireless-AC 1550i/s1
Killer™ Wi-Fi 6E AX1690i/s1
Killer™ Wi-Fi 6E AX1675x/w2
Killer™ Wi-Fi 6E AX1675i/s1
Killer™ Wi-Fi 6 AX1650i/s1 Windows 10 & 11
CVE-2022-46329 Intel® Wi-Fi 6 AX201 Windows 10 & 11
CVE-2022-36351 Intel® Wi-Fi 6 AX101
Intel® Wi-Fi 6 AX201
Intel® Wi-Fi 6 AX200
Intel® Wi-Fi 6 AX203
Intel® Wi-Fi 6E AX411
Intel® Wi-Fi 6E AX211
Intel® Wi-Fi 6E AX210 Windows 10 & 11
Linux
Chrome OS
UEFI
CVE-2022-36351 Killer™ Wi-Fi 6 AX1650
Killer™ Wi-Fi 6E AX1690
Killer™ Wi-Fi 6E AX1675 Windows 10 & 11
CVE-2022-38076 Intel® Wireless-AC 9560
Intel® Wireless-AC 9462
Intel® Wireless-AC 9461
Intel® Wireless-AC 9260 Windows 10 & 11
UEFI
CVE-2022-38076 Intel® Dual Band Wireless-AC 3168
Intel® Wireless 7265 (Rev D) Family
Intel® Dual Band Wireless-AC 3165
Intel® Dual Band Wireless-AC 8265
Intel® Dual Band Wireless-AC 8260
Intel® Wireless-AC 9560
Intel® Wireless-AC 9462
Intel® Wireless-AC 9461
Intel® Wireless-AC 9260 Linux
Chrome OS
CVE-2022-38076 Killer™ Wireless-AC 1550 Windows 10 & 11

1When adapter is used on 13th Generation Intel® Core Processor platforms.
2When adapter is used on any platform.

Recommendation:

Windows:
Intel recommends updating Intel® PROSet/Wireless WiFi software to version 22.200 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/download/19351&gt;

Important note regarding the mitigation ofCVE-2022-27635:
For the below Intel vPro® platforms that have Intel® Active Management Technology (AMT) provisioned and Wireless AMT enabled, the CSME version needs to be updated to the below version or newer.

Platform CSME Version or newer Affected Wireless Device
12th Generation Intel® Core Processor
-P series 16.1.25.1865v6.1 Intel® Wi-Fi 6E AX211
Intel® Wi-Fi 6E AX210
12th Generation Intel® Core Processor
-M,-S or -SBGA series 16.1.25.1885v2 Intel® Wi-Fi 6E AX211
Intel® Wi-Fi 6E AX210
11th Generation Intel® Core Processors
500 series chipset 15.0.42.2235 Intel® Wi-Fi 6E AX210
11th Generation Intel® Core Processors
400 series chipset 14.1.67.2046 Intel® Wi-Fi 6E AX210
11th Generation Intel® Core Processor
-U series 500 series chipset 15.0.42.2268 Intel® Wi-Fi 6E AX210 Embedded
(IOT platform with Linux OS)

Intel recommends that users of Intel® vPRO® CSME WiFi products update to the latest version provided by the system manufacturer that addresses these issues.

Intel recommends updating Killer™ WiFi software to version34.22.1163 or later.
Updates for Killer™ products are available for download at this location:
<https://www.intel.com/content/www/us/en/download/19779&gt;

UEFI:

UEFI firmware to version 3.2.20.23023 (includes versions 2.2.20.23023 and 1.2.20.23023)or later.
Please contact your OEM support group to obtain the correct driver version.

Chrome OS:
Intel® PROSet/Wireless WiFi drivers to mitigate this vulnerability will be up streamed to Chromium by August 08, 2023. For any Google Chrome OS solution and schedule, please contact Google directly.

Linux OS:
Intel® PROSet/Wireless WiFi drivers to mitigate this vulnerability will be up streamed by August 08, 2023. Consult the regular open-source channels to obtain this update.

Acknowledgements:

These issues were found internally by Intel employees.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.