// For flags

CVE-2019-0136

kernel: insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver may allow an unauthenticated user to potentially enable DoS via adjacent access

Severity Score

4.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

Un control de acceso insuficiente en el controlador del software PROSet/Wireless WiFi de Intel® anterior a versión 21.10, puede permitir a un usuario no autenticado habilitar potencialmente la denegación de servicio por medio del acceso adyacente.

A flaw was found in the Linux kernel’s implementation of wireless drivers for the Intel PROset wireless hardware. This flaw allows an unauthorized attacker within the wireless radio range to cause the driver and the system to disconnect from the wireless network, triggering the operating system to lose network connectivity while the system is not connected. The highest threat from this vulnerability is system availability.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-11-13 CVE Reserved
  • 2019-06-13 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-11-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Intel
Search vendor "Intel"
Proset\/wireless Wifi
Search vendor "Intel" for product "Proset\/wireless Wifi"
< 21.10
Search vendor "Intel" for product "Proset\/wireless Wifi" and version " < 21.10"
-
Affected
in Google
Search vendor "Google"
Chrome Os
Search vendor "Google" for product "Chrome Os"
--
Safe
Intel
Search vendor "Intel"
Proset\/wireless Wifi
Search vendor "Intel" for product "Proset\/wireless Wifi"
< 21.10
Search vendor "Intel" for product "Proset\/wireless Wifi" and version " < 21.10"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Intel
Search vendor "Intel"
Proset\/wireless Wifi
Search vendor "Intel" for product "Proset\/wireless Wifi"
< 21.10
Search vendor "Intel" for product "Proset\/wireless Wifi" and version " < 21.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Safe
Intel
Search vendor "Intel"
Proset\/wireless Wifi
Search vendor "Intel" for product "Proset\/wireless Wifi"
< 21.10
Search vendor "Intel" for product "Proset\/wireless Wifi" and version " < 21.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 7
Search vendor "Microsoft" for product "Windows 7"
--
Safe
Intel
Search vendor "Intel"
Proset\/wireless Wifi
Search vendor "Intel" for product "Proset\/wireless Wifi"
< 21.10
Search vendor "Intel" for product "Proset\/wireless Wifi" and version " < 21.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 8.1
Search vendor "Microsoft" for product "Windows 8.1"
--
Safe