ID

VAR-202202-1347


CVE

CVE-2021-33110


TITLE

plural  Intel(R) Wireless Bluetooth(R)  products and  Killer(TM) Bluetooth(R)  Product input verification vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2022-005232

DESCRIPTION

Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-33110 // JVNDB: JVNDB-2022-005232

IOT TAXONOMY

category:['network device']sub_category:bluetooth device

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:intelmodel:ax201scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 3165scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 7265scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ax200scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 9462scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 9560scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 9260scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 1550scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ax210scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 8265scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 9461scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ax1675scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ax1650scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 8260scope:ltversion:22.80

Trust: 1.0

vendor:intelmodel:ac 3168scope:ltversion:22.80

Trust: 1.0

vendor:インテルmodel:intel ac 9461scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 8265scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 7265scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 1550scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9462scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9560scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 9260scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 8260scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 3168scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel ac 3165scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-005232 // NVD: CVE-2021-33110

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33110
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-33110
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-33110
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202202-712
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-33110
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-33110
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2021-33110
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-005232 // CNNVD: CNNVD-202202-712 // NVD: CVE-2021-33110 // NVD: CVE-2021-33110

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-005232 // NVD: CVE-2021-33110

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202202-712

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202202-712

PATCH

title:INTEL-SA-00581url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html

Trust: 0.8

title:Intel Wireless Bluetooth and Killer Bluetooth Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=181762

Trust: 0.6

sources: JVNDB: JVNDB-2022-005232 // CNNVD: CNNVD-202202-712

EXTERNAL IDS

db:NVDid:CVE-2021-33110

Trust: 3.3

db:JVNid:JVNVU99045838

Trust: 0.8

db:JVNDBid:JVNDB-2022-005232

Trust: 0.8

db:AUSCERTid:ESB-2022.0550

Trust: 0.6

db:CS-HELPid:SB2022020916

Trust: 0.6

db:LENOVOid:LEN-73437

Trust: 0.6

db:CNNVDid:CNNVD-202202-712

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2022-005232 // CNNVD: CNNVD-202202-712 // NVD: CVE-2021-33110

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33110

Trust: 1.4

url:https://jvn.jp/vu/jvnvu99045838/

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022020916

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0550

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-73437

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2022-005232 // CNNVD: CNNVD-202202-712 // NVD: CVE-2021-33110

SOURCES

db:OTHERid: -
db:JVNDBid:JVNDB-2022-005232
db:CNNVDid:CNNVD-202202-712
db:NVDid:CVE-2021-33110

LAST UPDATE DATE

2025-05-07T21:41:01.051000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-005232date:2023-05-24T05:34:00
db:CNNVDid:CNNVD-202202-712date:2022-03-10T00:00:00
db:NVDid:CVE-2021-33110date:2025-05-05T17:17:11.697

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-005232date:2023-05-24T00:00:00
db:CNNVDid:CNNVD-202202-712date:2022-02-08T00:00:00
db:NVDid:CVE-2021-33110date:2022-02-09T23:15:15.427