Lucene search

K
vulnrichmentIntelVULNRICHMENT:CVE-2023-38417
HistoryMay 16, 2024 - 8:47 p.m.

CVE-2023-38417

2024-05-1620:47:16
CWE-20
intel
github.com
cve-2023-38417
input validation
intel
denial of service
adjacent access

4.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Improper input validation for some Intel® PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) PROSet/Wireless WiFi software",
    "versions": [
      {
        "version": "before version 23.20",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.3 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for VULNRICHMENT:CVE-2023-38417