Intel iNet Wireless Daemon (IWD) 0.10

CPE Details

Intel iNet Wireless Daemon (IWD) 0.10
0.10
2020-08-19
14h02 +00:00
2020-08-19
14h02 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:intel:inet_wireless_daemon:0.10:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

inet_wireless_daemon

Version

0.10

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-28084 2024-03-03 00h00 +00:00 p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.
7.5
High
CVE-2023-52161 2024-02-21 23h00 +00:00 The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.
7.5
High
CVE-2020-8689 2020-08-13 01h13 +00:00 Improper buffer restrictions in the Intel(R) Wireless for Open Source before version 1.5 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
6.5
Medium
CVE-2020-17497 2020-08-12 13h15 +00:00 eapol.c in iNet wireless daemon (IWD) through 1.8 allows attackers to trigger a PTK reinstallation by retransmitting EAPOL Msg4/4.
8.1
High