CVE-2023-38417
Description
Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Improper input validation in Intel PROSet/Wireless WiFi software before 23.20 allows adjacent unauthenticated attackers to cause denial of service.
Vulnerability
Overview
CVE-2023-38417 is a medium-severity denial-of-service vulnerability affecting Intel(R) PROSet/Wireless WiFi software prior to version 23.20. The issue stems from improper input validation, which can be exploited by an unauthenticated attacker with adjacent access to crash or disrupt the software, leading to a denial-of-service condition [1].
Attack
Vector and Prerequisites
An attacker must be within physical or logical proximity to the target system (adjacent access) to exploit this vulnerability. No authentication is required, and the attack complexity is low, as indicated by the CVSS v3 base score of 4.3 [1]. The attack surface is limited to wireless networks where the vulnerable software is running.
Impact and
Mitigation
Successful exploitation results in a denial-of-service scenario, which could disrupt network connectivity or degrade system performance. Intel has addressed this vulnerability in version 23.20 of the PROSet/Wireless WiFi software. Users are advised to update to the latest version to mitigate the risk [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.