Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
History
21 Nov 2024, 05:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html - Vendor Advisory |
19 Nov 2021, 20:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.1
v3 : 6.5 |
CWE | CWE-20 | |
CPE | cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:* cpe:2.3:h:intel:7265:-:*:*:*:*:*:*:* cpe:2.3:o:intel:7265_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ac1550:-:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:* cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:ac1550_firmware:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html - Vendor Advisory |
17 Nov 2021, 20:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-17 20:15
Updated : 2024-11-21 05:41
NVD link : CVE-2021-0079
Mitre link : CVE-2021-0079
CVE.ORG link : CVE-2021-0079
JSON object : View
Products Affected
intel
- ac_8260
- ac1550
- ax1650_firmware
- ac_8265_firmware
- ac_8265
- ac_3168_firmware
- ax201_firmware
- ax1650
- ac_9260_firmware
- ac1550_firmware
- ac_9560_firmware
- ax210
- ax210_firmware
- ac_9462
- ac_3168
- ac_3165_firmware
- ac_8260_firmware
- ac_9260
- ax1675
- ax201
- ax200
- 7265_firmware
- ac_9560
- ac_9461_firmware
- 7265
- ax200_firmware
- ac_9462_firmware
- ac_3165
- ac_9461
- ax1675_firmware
CWE
CWE-20
Improper Input Validation