Vulnerability Name:

CVE-2019-0136 (CCN-162499)

Assigned:2018-11-13
Published:2019-06-11
Updated:2020-08-24
Summary:Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVSS v3 Severity:7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
4.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L)
4.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
4.7 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L)
4.1 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
3.3 Low (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-0136

Source: CCN
Type: JVN#75617741
Intel Dual Band Wireless-AC 8260 vulnerable to denial-of-service (DoS)

Source: JVN
Type: UNKNOWN
JVN#75617741

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html

Source: BID
Type: Third Party Advisory, VDB Entry
108777

Source: XF
Type: UNKNOWN
intel-cve20190136-dos(162499)

Source: MLIST
Type: UNKNOWN
[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update

Source: MLIST
Type: UNKNOWN
[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update

Source: MLIST
Type: UNKNOWN
[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update

Source: MLIST
Type: UNKNOWN
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update

Source: CONFIRM
Type: Third Party Advisory
https://support.lenovo.com/us/en/product_security/LEN-27828

Source: UBUNTU
Type: UNKNOWN
USN-4115-1

Source: UBUNTU
Type: UNKNOWN
USN-4118-1

Source: UBUNTU
Type: UNKNOWN
USN-4145-1

Source: UBUNTU
Type: UNKNOWN
USN-4147-1

Source: CCN
Type: INTEL-SA-00232
Intel PROSet/Wireless WiFi Software Advisory

Source: CONFIRM
Type: UNKNOWN
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:intel:proset/wireless_wifi:*:*:*:*:*:*:*:* (Version < 21.10)
  • AND
  • cpe:/o:google:chrome_os:-:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_10:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8.1:-:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:58934
    P
    Security update for the Linux Kernel (Important) (in QA)
    2022-01-17
    oval:org.opensuse.security:def:87575
    P
    Security update for the Linux Kernel (Important) (in QA)
    2022-01-17
    oval:org.opensuse.security:def:33111
    P
    Security update for the Linux Kernel (Important) (in QA)
    2022-01-17
    oval:org.opensuse.security:def:44822
    P
    Security update for the Linux Kernel (Important)
    2022-01-11
    oval:org.opensuse.security:def:40392
    P
    Security update for the Linux Kernel (Important)
    2022-01-11
    oval:com.redhat.rhsa:def:20203220
    P
    RHSA-2020:3220: kernel security and bug fix update (Important)
    2020-07-29
    oval:com.ubuntu.cosmic:def:201901360000000
    V
    CVE-2019-0136 on Ubuntu 18.10 (cosmic) - medium.
    2019-06-18
    oval:com.ubuntu.bionic:def:201901360000000
    V
    CVE-2019-0136 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-06-18
    oval:com.ubuntu.xenial:def:201901360000000
    V
    CVE-2019-0136 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-06-18
    oval:com.ubuntu.disco:def:201901360000000
    V
    CVE-2019-0136 on Ubuntu 19.04 (disco) - medium.
    2019-06-13
    BACK
    intel proset/wireless wifi *
    google chrome os -
    linux linux kernel -
    microsoft windows 10 -
    microsoft windows 7 -
    microsoft windows 8.1 -