Vulnerabilites related to intel - dual_band_wireless-ac_7265_\(rev_d\)
cve-2018-12177
Vulnerability from cvelistv5
Published
2019-01-10 20:00
Modified
2024-09-16 16:57
Severity ?
Summary
Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T08:30:59.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "before 20.90.0.7.",
                  },
               ],
            },
         ],
         datePublic: "2019-01-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-01-10T19:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2019-01-08T00:00:00",
               ID: "CVE-2018-12177",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "before 20.90.0.7.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-12177",
      datePublished: "2019-01-10T20:00:00Z",
      dateReserved: "2018-06-11T00:00:00",
      dateUpdated: "2024-09-16T16:57:52.114Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0557
Vulnerability from cvelistv5
Published
2020-04-15 16:58
Modified
2024-08-04 06:02
Severity ?
Summary
Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Version: Before version 21.70
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.200Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Before version 21.70",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-15T16:58:14",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0557",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Before version 21.70",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0557",
      datePublished: "2020-04-15T16:58:14",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.200Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11155
Vulnerability from cvelistv5
Published
2019-11-14 16:54
Modified
2024-08-04 22:48
Severity ?
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.955Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:54:16",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11155",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software Security",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11155",
      datePublished: "2019-11-14T16:54:16",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.955Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11156
Vulnerability from cvelistv5
Published
2019-11-14 16:54
Modified
2024-08-04 22:48
Severity ?
Summary
Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.526Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:54:27",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11156",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software Security",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11156",
      datePublished: "2019-11-14T16:54:27",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.526Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11153
Vulnerability from cvelistv5
Published
2019-11-14 16:55
Modified
2024-08-04 22:48
Severity ?
Summary
Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.656Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:55:53",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11153",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11153",
      datePublished: "2019-11-14T16:55:53",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.656Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11154
Vulnerability from cvelistv5
Published
2019-11-14 16:53
Modified
2024-08-04 22:48
Severity ?
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.276Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:53:59",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11154",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software Security",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11154",
      datePublished: "2019-11-14T16:53:59",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.276Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0558
Vulnerability from cvelistv5
Published
2020-04-15 16:58
Modified
2024-08-04 06:02
Severity ?
Summary
Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Version: Before version 21.70
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:02:52.309Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Before version 21.70",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-15T16:58:21",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2020-0558",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Before version 21.70",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2020-0558",
      datePublished: "2020-04-15T16:58:21",
      dateReserved: "2019-10-28T00:00:00",
      dateUpdated: "2024-08-04T06:02:52.309Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.",
      },
      {
         lang: "es",
         value: "Unos problemas de corrupción de memoria en la extensión DLL de Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión 21.40, pueden permitir a un usuario autenticado potencialmente permitir una escalada de privilegios, una divulgación de información y una denegación de servicio por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11153",
   lastModified: "2024-11-21T04:20:37.903",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.460",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-04-15 17:15
Modified
2024-11-21 04:53
Summary
Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "992196CF-5919-4B00-9D1E-879BD5B61B54",
                     versionEndExcluding: "21.70.0.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C0FFFB-536F-4F4E-9CEA-A38BA0912045",
                     versionEndExcluding: "20.70.16.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAFE5490-D953-4B1C-9E2C-20F31C81FD59",
                     versionEndExcluding: "19.51.27.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.",
      },
      {
         lang: "es",
         value: "Unas restricciones inapropiadas del búfer en el controlador del modo kernel para los productos Intel® PROSet/Wireless WiFi versiones anteriores a la versión 21.70 en Windows 10, pueden permitir a un usuario no privilegiado habilitar potencialmente una denegación de servicio por medio de un acceso adyacente.",
      },
   ],
   id: "CVE-2020-0558",
   lastModified: "2024-11-21T04:53:45.497",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-04-15T17:15:14.000",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Los permisos de directorio inapropiados en Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión 21.40, puede habilitar a un usuario autenticado para permitir potencialmente una denegación de servicio y una divulgación de información por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11155",
   lastModified: "2024-11-21T04:20:38.120",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.567",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-01-10 20:29
Modified
2024-11-21 03:44
Summary
Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6C36F99-22B7-4E64-B44F-61FDFEA27834",
                     versionEndExcluding: "20.90.0.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1F7C3F-7685-45F0-B4E6-C2CE4248B5B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260_for_desktop:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B9F37F-809C-47CE-8457-945008C12A7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265\\(rev_c\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "539B6714-85C6-4FA2-96CA-B0F4027EB7EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265_desktop_kit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D232DE7-F310-49EE-A9F7-310D808EB639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "141446CB-9BBF-451B-A8F9-67A4A301579B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_c\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0671E023-987F-404F-89BF-17F45D2AC374",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "620E5F09-EEA6-4093-82E2-7A28C7E7DD9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15745BD1-2362-4747-8C45-21AF5309BE3E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1868F499-00F3-4393-890B-6C8BE3E4A8AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC86AE37-F425-4CD7-B061-2B784BC6778D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7265_\\(rev_c\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0355BEA-D410-4241-AACD-D043E5B2943B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67AFEE2E-CE9F-46A2-834E-44A9C95076E0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "Permisos de directorio incorrectos en el servicio ZeroConfig en el software Intel(R) PROSet/Wireless WiFi, en versiones anteriores a la 20.90.0.7, podría permitir que un usuario autorizado habilite el escalado de privilegios mediante acceso local.",
      },
   ],
   id: "CVE-2018-12177",
   lastModified: "2024-11-21T03:44:42.233",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-01-10T20:29:00.393",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-04-15 17:15
Modified
2024-11-21 04:53
Summary
Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "992196CF-5919-4B00-9D1E-879BD5B61B54",
                     versionEndExcluding: "21.70.0.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C0FFFB-536F-4F4E-9CEA-A38BA0912045",
                     versionEndExcluding: "20.70.16.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAFE5490-D953-4B1C-9E2C-20F31C81FD59",
                     versionEndExcluding: "19.51.27.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "Los permisos heredados no seguros en los productos Intel® PROSet/Wireless WiFi versiones anteriores a la versión  21.70, en Windows 10 pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local.",
      },
   ],
   id: "CVE-2020-0557",
   lastModified: "2024-11-21T04:53:45.380",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-04-15T17:15:13.937",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00338.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Los errores lógicos en Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión  21.40, puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios, una denegación de servicio y una divulgación de información por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11156",
   lastModified: "2024-11-21T04:20:38.227",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.630",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Los permisos de directorio inapropiados en Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión  21.40, puede habilitar a un usuario autenticado para permitir potencialmente una denegación de servicio y una divulgación de información por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11154",
   lastModified: "2024-11-21T04:20:38.010",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.520",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}