Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2022:1065-1 advisory.
  - Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and     Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation     of privilege via local access. (CVE-2021-0066)
  - Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an     unauthenticated user to potentially enable escalation of privilege via adjacent access. (CVE-2021-0071)
  - Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating     systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable     information disclosure via local access. (CVE-2021-0072)
  - Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R)     PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may     allow a privileged user to potentially enable denial of service via local access. (CVE-2021-0076)
  - Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and     Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of     privilege via local access. (CVE-2021-0161)
  - Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and     Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation     of privilege via local access. (CVE-2021-0164)
  - Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and     Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of     service via adjacent access. (CVE-2021-0165)
  - Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless     Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged     user to potentially enable escalation of privilege via local access. (CVE-2021-0166)
  - Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating     systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable     escalation of privilege via local access. (CVE-2021-0168)
  - Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless     Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an     authenticated user to potentially enable information disclosure via local access. (CVE-2021-0170)
  - Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating     systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially     enable denial of service via adjacent access. (CVE-2021-0172)
  - Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in     multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user     to potentially enable denial of service via adjacent access. (CVE-2021-0173)
  - Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple     operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to     potentially enable denial of service via adjacent access. (CVE-2021-0174)
  - Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R)     PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may     allow an unauthenticated user to potentially enable denial of service via adjacent access. (CVE-2021-0175)
  - Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating     systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable     denial of service via local access. (CVE-2021-0176)
  - Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R)     PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may     allow an unauthenticated user to potentially enable denial of service via adjacent access. (CVE-2021-0183)
  - Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R)     products before version 22.100 may allow an authenticated user to potentially enable denial of service via     adjacent access. (CVE-2021-33139)
  - Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R)     products before version 22.100 may allow an authenticated user to potentially enable denial of service via     adjacent access. (CVE-2021-33155)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: openSUSE-2022-1065-1.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:novell:opensuse:ucode-amd, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:kernel-firmware-all, p-cpe:/a:novell:opensuse:kernel-firmware-amdgpu, p-cpe:/a:novell:opensuse:kernel-firmware-ath10k, p-cpe:/a:novell:opensuse:kernel-firmware-ath11k, p-cpe:/a:novell:opensuse:kernel-firmware-bluetooth, p-cpe:/a:novell:opensuse:kernel-firmware-bnx2, p-cpe:/a:novell:opensuse:kernel-firmware-brcm, p-cpe:/a:novell:opensuse:kernel-firmware-chelsio, p-cpe:/a:novell:opensuse:kernel-firmware-i915, p-cpe:/a:novell:opensuse:kernel-firmware-intel, p-cpe:/a:novell:opensuse:kernel-firmware-mediatek, p-cpe:/a:novell:opensuse:kernel-firmware-network, p-cpe:/a:novell:opensuse:kernel-firmware-nfp, p-cpe:/a:novell:opensuse:kernel-firmware-nvidia, p-cpe:/a:novell:opensuse:kernel-firmware-qlogic, p-cpe:/a:novell:opensuse:kernel-firmware-radeon, p-cpe:/a:novell:opensuse:kernel-firmware-sound, p-cpe:/a:novell:opensuse:kernel-firmware-ueagle, p-cpe:/a:novell:opensuse:kernel-firmware-usb-network, p-cpe:/a:novell:opensuse:kernel-firmware, p-cpe:/a:novell:opensuse:kernel-firmware-atheros, p-cpe:/a:novell:opensuse:kernel-firmware-dpaa2, p-cpe:/a:novell:opensuse:kernel-firmware-iwlwifi, p-cpe:/a:novell:opensuse:kernel-firmware-liquidio, p-cpe:/a:novell:opensuse:kernel-firmware-marvell, p-cpe:/a:novell:opensuse:kernel-firmware-media, p-cpe:/a:novell:opensuse:kernel-firmware-mellanox, p-cpe:/a:novell:opensuse:kernel-firmware-mwifiex, p-cpe:/a:novell:opensuse:kernel-firmware-platform, p-cpe:/a:novell:opensuse:kernel-firmware-prestera, p-cpe:/a:novell:opensuse:kernel-firmware-realtek, p-cpe:/a:novell:opensuse:kernel-firmware-serial, p-cpe:/a:novell:opensuse:kernel-firmware-ti
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 3/31/2022
Vulnerability Publication Date: 11/17/2021
Reference Information
CVE: CVE-2021-0066, CVE-2021-0071, CVE-2021-0072, CVE-2021-0076, CVE-2021-0161, CVE-2021-0164, CVE-2021-0165, CVE-2021-0166, CVE-2021-0168, CVE-2021-0170, CVE-2021-0172, CVE-2021-0173, CVE-2021-0174, CVE-2021-0175, CVE-2021-0176, CVE-2021-0183, CVE-2021-33139, CVE-2021-33155