ID

VAR-202202-0512


CVE

CVE-2021-33155


TITLE

plural  Intel(R) Wireless Bluetooth(R)  and  Killer(TM) Bluetooth(R)  product   Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-005125

DESCRIPTION

Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access. plural Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) product There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-33155 // JVNDB: JVNDB-2022-005125

IOT TAXONOMY

category:['network device']sub_category:bluetooth device

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:intelmodel:ax210scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ax211scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 9461scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 8265scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ax1675scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ax1650scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 8260scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ax201scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 3165scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac3168scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ax200scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 7265scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 9462scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 9560scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 9260scope:ltversion:22.100

Trust: 1.0

vendor:intelmodel:ac 1550scope:ltversion:22.100

Trust: 1.0

vendor:インテルmodel:intel ax200scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9260scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9462scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 8265scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 8260scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9560scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ax210scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ax211scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ax201scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9461scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-005125 // NVD: CVE-2021-33155

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33155
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-33155
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-33155
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202202-702
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-33155
severity: LOW
baseScore: 2.7
vectorString: AV:A/AC:L/AU:S/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-33155
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2021-33155
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-005125 // CNNVD: CNNVD-202202-702 // NVD: CVE-2021-33155 // NVD: CVE-2021-33155

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-005125 // NVD: CVE-2021-33155

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202202-702

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202202-702

PATCH

title:INTEL-SA-00604url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html

Trust: 0.8

title:Intel Wireless Bluetooth and Killer Bluetooth Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=181759

Trust: 0.6

sources: JVNDB: JVNDB-2022-005125 // CNNVD: CNNVD-202202-702

EXTERNAL IDS

db:NVDid:CVE-2021-33155

Trust: 3.3

db:JVNid:JVNVU99045838

Trust: 0.8

db:JVNDBid:JVNDB-2022-005125

Trust: 0.8

db:CS-HELPid:SB2022020915

Trust: 0.6

db:LENOVOid:LEN-76841

Trust: 0.6

db:AUSCERTid:ESB-2022.0929

Trust: 0.6

db:AUSCERTid:ESB-2022.0549

Trust: 0.6

db:CNNVDid:CNNVD-202202-702

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2022-005125 // CNNVD: CNNVD-202202-702 // NVD: CVE-2021-33155

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33155

Trust: 1.4

url:https://jvn.jp/vu/jvnvu99045838/

Trust: 0.8

url:https://support.lenovo.com/us/en/product_security/len-76841

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-wireless-bluetooth-killer-bluetooth-two-vulnerabilities-37706

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0929

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022020915

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0549

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2022-005125 // CNNVD: CNNVD-202202-702 // NVD: CVE-2021-33155

SOURCES

db:OTHERid: -
db:JVNDBid:JVNDB-2022-005125
db:CNNVDid:CNNVD-202202-702
db:NVDid:CVE-2021-33155

LAST UPDATE DATE

2025-05-07T21:05:48.613000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-005125date:2023-05-18T08:12:00
db:CNNVDid:CNNVD-202202-702date:2022-03-10T00:00:00
db:NVDid:CVE-2021-33155date:2025-05-05T17:17:25.017

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-005125date:2023-05-18T00:00:00
db:CNNVDid:CNNVD-202202-702date:2022-02-08T00:00:00
db:NVDid:CVE-2021-33155date:2022-02-09T23:15:15.820