Vulnerabilities > CVE-2020-0558 - Unspecified vulnerability in Intel Proset/Wireless Wifi
Attack vector
ADJACENT_NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | INTEL_SA_00338_WLAN.NASL |
description | A wireless network adapter driver on the remote host is affected by multiple security vulnerabilities: - Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2020-0557) - Improper buffer restrictions in kernel mode driver for Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an unprivileged user to potentially enable denial of service via adjacent access. (CVE-2020-0558) Note that Nessus has not tested for this issue but has instead relied only on the application |
last seen | 2020-05-31 |
modified | 2020-05-15 |
plugin id | 136670 |
published | 2020-05-15 |
reporter | This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/136670 |
title | Intel® PROSet/Wireless WiFi Software x < 21.70.0 Multiple Vulnerabilities |