VYPR
Medium severity4.3NVD Advisory· Published May 16, 2024· Updated Apr 15, 2026

CVE-2023-38417

CVE-2023-38417

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper input validation in Intel PROSet/Wireless WiFi software before 23.20 allows adjacent unauthenticated attackers to cause denial of service.

Vulnerability

Overview

CVE-2023-38417 is a medium-severity denial-of-service vulnerability affecting Intel(R) PROSet/Wireless WiFi software prior to version 23.20. The issue stems from improper input validation, which can be exploited by an unauthenticated attacker with adjacent access to crash or disrupt the software, leading to a denial-of-service condition [1].

Attack

Vector and Prerequisites

An attacker must be within physical or logical proximity to the target system (adjacent access) to exploit this vulnerability. No authentication is required, and the attack complexity is low, as indicated by the CVSS v3 base score of 4.3 [1]. The attack surface is limited to wireless networks where the vulnerable software is running.

Impact and

Mitigation

Successful exploitation results in a denial-of-service scenario, which could disrupt network connectivity or degrade system performance. Intel has addressed this vulnerability in version 23.20 of the PROSet/Wireless WiFi software. Users are advised to update to the latest version to mitigate the risk [1].

References
  1. INTEL-SA-01039

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.