Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3596-1 | firmware-nonfree security update |
EUVD |
EUVD-2022-44210 | Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. |
Mon, 17 Mar 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:8 |
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-02-13T16:33:02.510Z
Reserved: 2022-09-27T00:28:29.138Z
Link: CVE-2022-40964
Updated: 2024-08-03T12:28:42.971Z
Status : Modified
Published: 2023-08-11T03:15:14.603
Modified: 2024-11-21T07:22:19.010
Link: CVE-2022-40964
OpenCVE Enrichment
No data.
Debian DLA
EUVD