René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

206 lines
7.2 KiB
JSON

{
"id": "CVE-2021-33110",
"sourceIdentifier": "secure@intel.com",
"published": "2022-02-09T23:15:15.427",
"lastModified": "2022-02-15T21:27:39.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n de entrada inapropiada para algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) en Windows 10 y 11 versiones anteriores a 22.80, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_1550_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "19F1318A-DC18-4B43-AE3E-5503AF736CDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "376BFF3F-01EF-4934-AE12-FFEB3E267AC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "5339D925-8AA8-404E-9B1F-D59B858D01ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "9AE5EB5A-242B-49B1-9C25-0FDB103C423B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "3E588CCB-2A79-4928-8F56-5E35E01A2951"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "3EFEF0A1-9BA3-4493-A6AC-39175561FAE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "0A9AD3A5-A1F6-40E2-8A87-7A45C93C4FA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "256CF170-AA62-43DE-BEFF-C239C5AB7EDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "F6EEB3E2-967A-452B-912D-229A0B41E6D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "E5836520-3723-4413-A5D0-CDB7C05BCA4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "2DED084C-D05C-4434-AF2F-986AC6A048BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "C74D9261-71B9-4349-99EA-FAAEFF605F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "9FAD9AED-34D7-4AD7-B10D-AE4324350A87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "4A192881-0151-4883-BF1C-AB40CB7D9E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.80",
"matchCriteriaId": "AB99AE86-B30D-40D0-B3C4-2903DC26308A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}