VYPR
Medium severity4.7NVD Advisory· Published May 16, 2024· Updated Apr 15, 2026

CVE-2023-47210

CVE-2023-47210

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi software for linux before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper input validation in Intel PROSet/Wireless WiFi software for Linux before 23.20 allows unauthenticated DoS via adjacent access.

Vulnerability

Overview

CVE-2023-47210 describes an improper input validation vulnerability in Intel(R) PROSet/Wireless WiFi software for Linux. The flaw exists in versions prior to 23.20 and arises from insufficient validation of input data. This software manages wireless networking functions on Linux systems [1].

Attack

Vector

An unauthenticated attacker with adjacent network access can exploit this vulnerability. No user authentication is required, meaning the attacker only needs to be within wireless range of the target system. The exploitation does not require any special privileges [1].

Impact

Successful exploitation results in a denial of service (DoS) condition. The attacker can cause the affected wireless software to stop functioning properly, potentially disrupting network connectivity for the Linux host [1].

Mitigation

Intel has released version 23.20 of the PROSet/Wireless WiFi software for Linux, which addresses the improper input validation. Users are strongly recommended to update to this version or later to protect against potential DoS attacks [1].

References
  1. INTEL-SA-01039

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.