Vulnerability Name:

CVE-2021-33110 (CCN-219018)

Assigned:2021-05-18
Published:2022-02-08
Updated:2022-02-15
Summary:Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
3.3 Low (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-20
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-33110

Source: XF
Type: UNKNOWN
intel-cve202133110-dos(219018)

Source: CCN
Type: INTEL-SA-00581
Intel Wireless Bluetooth and Killer Bluetooth for Windows Advisory

Source: MISC
Type: Vendor Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html

Vulnerable Configuration:Configuration 1:
  • cpe:/o:intel:ac_1550_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_3165_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_3168_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_7265_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_8260_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_8265_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_9260_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_9461_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_9462_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ac_9560_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ax1650_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ax1675_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ax200_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ax201_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • OR cpe:/o:intel:ax210_firmware:*:*:*:*:*:*:*:* (Version < 22.80)
  • AND
  • cpe:/o:microsoft:windows_10:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_11:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*
  • OR cpe:/h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    intel ac 1550 firmware *
    intel ac 3165 firmware *
    intel ac 3168 firmware *
    intel ac 7265 firmware *
    intel ac 8260 firmware *
    intel ac 8265 firmware *
    intel ac 9260 firmware *
    intel ac 9461 firmware *
    intel ac 9462 firmware *
    intel ac 9560 firmware *
    intel ax1650 firmware *
    intel ax1675 firmware *
    intel ax200 firmware *
    intel ax201 firmware *
    intel ax210 firmware *
    microsoft windows 10 -
    microsoft windows 11 -
    intel wi-fi 6 ax201 -
    intel wi-fi 6 ax200 -