Vulnerabilites related to intel - dual_band_wireless-n_7265_\(rev_d\)
cve-2018-12177
Vulnerability from cvelistv5
Published
2019-01-10 20:00
Modified
2024-09-16 16:57
Severity ?
Summary
Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T08:30:59.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "before 20.90.0.7.",
                  },
               ],
            },
         ],
         datePublic: "2019-01-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-01-10T19:57:01",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               DATE_PUBLIC: "2019-01-08T00:00:00",
               ID: "CVE-2018-12177",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "before 20.90.0.7.",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-12177",
      datePublished: "2019-01-10T20:00:00Z",
      dateReserved: "2018-06-11T00:00:00",
      dateUpdated: "2024-09-16T16:57:52.114Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11155
Vulnerability from cvelistv5
Published
2019-11-14 16:54
Modified
2024-08-04 22:48
Severity ?
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.955Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:54:16",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11155",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software Security",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11155",
      datePublished: "2019-11-14T16:54:16",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.955Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11156
Vulnerability from cvelistv5
Published
2019-11-14 16:54
Modified
2024-08-04 22:48
Severity ?
Summary
Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.526Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:54:27",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11156",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software Security",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11156",
      datePublished: "2019-11-14T16:54:27",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.526Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11153
Vulnerability from cvelistv5
Published
2019-11-14 16:55
Modified
2024-08-04 22:48
Severity ?
Summary
Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.656Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Escalation of Privilege, Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:55:53",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11153",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) WIFI Drivers and Intel(R) PROSet/Wireless WiFi Software extension DLL",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Escalation of Privilege, Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11153",
      datePublished: "2019-11-14T16:55:53",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.656Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-11154
Vulnerability from cvelistv5
Published
2019-11-14 16:53
Modified
2024-08-04 22:48
Severity ?
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Software Security Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:08.276Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel(R) PROSet/Wireless WiFi Software Security",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service, Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-14T16:53:59",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11154",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel(R) PROSet/Wireless WiFi Software Security",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service, Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11154",
      datePublished: "2019-11-14T16:53:59",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:08.276Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory corruption issues in Intel(R) PROSet/Wireless WiFi Software extension DLL before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and a denial of service via local access.",
      },
      {
         lang: "es",
         value: "Unos problemas de corrupción de memoria en la extensión DLL de Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión 21.40, pueden permitir a un usuario autenticado potencialmente permitir una escalada de privilegios, una divulgación de información y una denegación de servicio por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11153",
   lastModified: "2024-11-21T04:20:37.903",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.460",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00287.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Los permisos de directorio inapropiados en Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión 21.40, puede habilitar a un usuario autenticado para permitir potencialmente una denegación de servicio y una divulgación de información por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11155",
   lastModified: "2024-11-21T04:20:38.120",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.567",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-01-10 20:29
Modified
2024-11-21 03:44
Summary
Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6C36F99-22B7-4E64-B44F-61FDFEA27834",
                     versionEndExcluding: "20.90.0.7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1F7C3F-7685-45F0-B4E6-C2CE4248B5B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7260_for_desktop:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B9F37F-809C-47CE-8457-945008C12A7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265\\(rev_c\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "539B6714-85C6-4FA2-96CA-B0F4027EB7EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265_desktop_kit:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D232DE7-F310-49EE-A9F7-310D808EB639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "141446CB-9BBF-451B-A8F9-67A4A301579B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_c\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0671E023-987F-404F-89BF-17F45D2AC374",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "620E5F09-EEA6-4093-82E2-7A28C7E7DD9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15745BD1-2362-4747-8C45-21AF5309BE3E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1868F499-00F3-4393-890B-6C8BE3E4A8AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC86AE37-F425-4CD7-B061-2B784BC6778D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7265_\\(rev_c\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0355BEA-D410-4241-AACD-D043E5B2943B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67AFEE2E-CE9F-46A2-834E-44A9C95076E0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.",
      },
      {
         lang: "es",
         value: "Permisos de directorio incorrectos en el servicio ZeroConfig en el software Intel(R) PROSet/Wireless WiFi, en versiones anteriores a la 20.90.0.7, podría permitir que un usuario autorizado habilite el escalado de privilegios mediante acceso local.",
      },
   ],
   id: "CVE-2018-12177",
   lastModified: "2024-11-21T03:44:42.233",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-01-10T20:29:00.393",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00182.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Los errores lógicos en Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión  21.40, puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios, una denegación de servicio y una divulgación de información por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11156",
   lastModified: "2024-11-21T04:20:38.227",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.630",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "898671D5-38BA-4822-8C9B-68E871BFC0BE",
                     versionEndExcluding: "21.40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3F3AC3-7774-44DE-82C3-531D874D6175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6C6BA3-F26D-4416-AAF5-96DD69BF12A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5900B9-D8E3-4928-B587-955BCAE07460",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89ED6FDA-BE47-4E7D-A449-439A917119DA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D294F2-69D6-4A3E-A190-BE39399C5B86",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F198C1B-28A8-4FB8-9266-333A6E465445",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper directory permissions in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable denial of service and information disclosure via local access.",
      },
      {
         lang: "es",
         value: "Los permisos de directorio inapropiados en Intel® PROSet/Wireless WiFi Software versiones anteriores a la versión  21.40, puede habilitar a un usuario autenticado para permitir potencialmente una denegación de servicio y una divulgación de información por medio de un acceso local.",
      },
   ],
   id: "CVE-2019-11154",
   lastModified: "2024-11-21T04:20:38.010",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T17:15:13.520",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00288.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}