ID

VAR-202202-0525


CVE

CVE-2021-33115


TITLE

Intel(R) PROSet/Wireless WiFi  of  UEFI  Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-005228

DESCRIPTION

Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Intel(R) PROSet/Wireless WiFi of UEFI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-33115 // JVNDB: JVNDB-2022-005228

IOT TAXONOMY

category:['network device']sub_category:Wi-Fi device

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:intelmodel:uefi wifi driverscope:ltversion:1.2.8.21337

Trust: 1.0

vendor:インテルmodel:uefi wifi ドライバscope:eqversion:uefi wifi driver

Trust: 0.8

vendor:インテルmodel:uefi wifi ドライバscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:uefi wifi ドライバscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-005228 // NVD: CVE-2021-33115

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33115
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-33115
value: HIGH

Trust: 1.0

NVD: CVE-2021-33115
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202202-675
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2021-33115
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-33115
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2021-33115
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-005228 // CNNVD: CNNVD-202202-675 // NVD: CVE-2021-33115 // NVD: CVE-2021-33115

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-005228 // NVD: CVE-2021-33115

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202202-675

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202202-675

PATCH

title:INTEL-SA-00582url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html

Trust: 0.8

title:Intel PROSet/Wireless WiFi Software Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=182181

Trust: 0.6

sources: JVNDB: JVNDB-2022-005228 // CNNVD: CNNVD-202202-675

EXTERNAL IDS

db:NVDid:CVE-2021-33115

Trust: 3.3

db:JVNid:JVNVU99045838

Trust: 0.8

db:JVNDBid:JVNDB-2022-005228

Trust: 0.8

db:CS-HELPid:SB2022020922

Trust: 0.6

db:AUSCERTid:ESB-2022.0545

Trust: 0.6

db:LENOVOid:LEN-73438

Trust: 0.6

db:CNNVDid:CNNVD-202202-675

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2022-005228 // CNNVD: CNNVD-202202-675 // NVD: CVE-2021-33115

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33115

Trust: 1.4

url:https://jvn.jp/vu/jvnvu99045838/

Trust: 0.8

url:https://support.lenovo.com/us/en/product_security/len-73438

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022020922

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0545

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2022-005228 // CNNVD: CNNVD-202202-675 // NVD: CVE-2021-33115

SOURCES

db:OTHERid: -
db:JVNDBid:JVNDB-2022-005228
db:CNNVDid:CNNVD-202202-675
db:NVDid:CVE-2021-33115

LAST UPDATE DATE

2025-05-07T19:45:57.708000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-005228date:2023-05-24T05:11:00
db:CNNVDid:CNNVD-202202-675date:2022-03-10T00:00:00
db:NVDid:CVE-2021-33115date:2025-05-05T17:17:13.677

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-005228date:2023-05-24T00:00:00
db:CNNVDid:CNNVD-202202-675date:2022-02-08T00:00:00
db:NVDid:CVE-2021-33115date:2022-02-09T23:15:15.547