DescriptionExposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firmware-nonfree (PTS)stretch/non-free20161130-5vulnerable
stretch/non-free (security)20190114-2~deb9u1vulnerable
sid/non-free, bookworm/non-free20210818-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree

Search for package or bug name: Reporting problems