Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3596-1 | firmware-nonfree security update |
EUVD |
EUVD-2022-40679 | Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access. |
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-02-13T16:32:56.803Z
Reserved: 2022-08-10T03:00:25.306Z
Link: CVE-2022-38076
Updated: 2024-08-03T10:45:52.414Z
Status : Modified
Published: 2023-08-11T03:15:13.843
Modified: 2024-11-21T07:15:43.863
Link: CVE-2022-38076
OpenCVE Enrichment
No data.
Debian DLA
EUVD