Vulnerability identifier: #VU48355
Vulnerability risk: Medium
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Intel Wi-Fi 6 AX201
Hardware solutions /
Firmware
Intel Wi-Fi 6 AX200
Hardware solutions /
Firmware
Intel Wireless-AC 9560
Hardware solutions /
Firmware
Intel Wireless-AC 9462
Hardware solutions /
Firmware
Intel Wireless-AC 9461
Hardware solutions /
Firmware
Intel Wireless-AC 9260
Hardware solutions /
Firmware
Intel Dual Band Wireless-AC 8265
Hardware solutions /
Firmware
Intel Dual Band Wireless-AC 8260
Hardware solutions /
Firmware
Intel Dual Band Wireless-AC 3168
Hardware solutions /
Firmware
Intel Wireless 7265 (Rev D) Family
Hardware solutions /
Firmware
Intel Dual Band Wireless-AC 3165
Hardware solutions /
Firmware
Vendor: Intel
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110. A remote attacker on the local network can send specially crafted traffic to the system and perform a denial of service (DoS) attack.
The vulnerability affects firmware on the following operating systems:
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Intel Wi-Fi 6 AX201: All versions
Intel Wi-Fi 6 AX200: All versions
Intel Wireless-AC 9560: All versions
Intel Wireless-AC 9462: All versions
Intel Wireless-AC 9461: All versions
Intel Wireless-AC 9260: All versions
Intel Dual Band Wireless-AC 8265: All versions
Intel Dual Band Wireless-AC 8260: 20.50.1.1 - 21.20.0
Intel Dual Band Wireless-AC 3168: All versions
Intel Wireless 7265 (Rev D) Family: All versions
Intel Dual Band Wireless-AC 3165: All versions
CPE
External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?