Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3596-1 | firmware-nonfree security update |
EUVD |
EUVD-2022-32136 | Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. |
Mon, 17 Mar 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:8 |
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-02-13T16:32:31.907Z
Reserved: 2022-03-21T23:31:41.455Z
Link: CVE-2022-27635
Updated: 2024-08-03T05:32:59.881Z
Status : Modified
Published: 2023-08-11T03:15:11.817
Modified: 2024-11-21T06:56:04.033
Link: CVE-2022-27635
OpenCVE Enrichment
No data.
Debian DLA
EUVD