Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-0079 (GCVE-0-2021-0079)
Vulnerability from cvelistv5
Published
2021-11-17 19:39
      Modified
2024-08-03 15:25
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - denial of service
Summary
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
            
          
        References
          
        Impacted products
        | Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 | Version: See references | 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-17T19:39:06",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0079",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0079",
    "datePublished": "2021-11-17T19:39:06",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:25:01.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-0079\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2021-11-17T20:15:08.943\",\"lastModified\":\"2024-11-21T05:41:48.593\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n de entrada inapropiada en el software para algunos Intel\u00ae PROSet / Wireless WiFi y Killer\u2122 WiFi en Windows 10 puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"F0A41A8C-0D70-4EC8-BC88-AAA876CB5F09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F226D74C-4A48-4AC0-A565-A00D555E27D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"82E88D9E-29D5-4CFE-B667-74C39E488E0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4649D446-130B-4B31-B9ED-BA7F9F7EEB8F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"BB80AB07-B842-4749-A133-6A55FEF280FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9903E2E-A670-40D4-8B9F-D2C0CFDBFC9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"19D507F8-70EE-4880-B669-CCE410465C07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D382D4A1-C8FD-4B47-B2C4-145232EC8AC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"1A0BF72A-4B7C-4C2B-B461-92762D5463C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E89EB0D-233A-486A-BDAE-F5726432CD7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"0AF8F2FE-CB8D-407D-914D-53AA38704613\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A11E55E8-5FA9-4ED7-AB61-03F22EE1759B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"EB41ECC4-0CD4-4E1B-A940-CEBE7B637BFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2795E42-D044-4D48-BCB2-61CC1A3471B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"8F38F4A4-7979-495C-BCED-359DDBE24CF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C08E2F3E-C4B5-4227-A88D-C50E209A12CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"8662B65E-418E-40CF-95DE-9E5FA64B791F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"00E5286C-C0A9-442F-B9CB-222B9F2D37AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5B2BCE-2D8A-440C-B866-76E035314022\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:7265_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"E74567DC-0E26-4EE9-A4E5-3575F9162A03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:7265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F957A9E7-E2D2-48D7-8E4D-B264A72C59C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.40\",\"matchCriteriaId\":\"8CE5D3D6-2462-4833-89A6-9FF94A38822E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"197A3DA1-B8EF-438F-B933-32253C43C8EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.1541\",\"matchCriteriaId\":\"9076C2BD-41C4-4E9F-8CDE-0B155FFBA22A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F407ACA-0952-4717-A302-2D5CEB6DB111\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.1541\",\"matchCriteriaId\":\"820056A9-122F-455D-AC52-84E46949A255\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B944F7-4A5F-41D0-A910-6F978F66CAA0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ac1550_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.1541\",\"matchCriteriaId\":\"A2E9A0A8-99E6-4407-A92E-AB7128E8F7AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ac1550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2809983C-2D12-4353-BC94-D0E177CD214F\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}
  fkie_cve-2021-0079
Vulnerability from fkie_nvd
Published
2021-11-17 20:15
    Modified
2024-11-21 05:41
    
          Severity ?
        
        
    Summary
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    References
      
    Impacted products
      | Vendor | Product | Version | |
|---|---|---|---|
| intel | ax210_firmware | * | |
| intel | ax210 | - | |
| intel | ax201_firmware | * | |
| intel | ax201 | - | |
| intel | ax200_firmware | * | |
| intel | ax200 | - | |
| intel | ac_9560_firmware | * | |
| intel | ac_9560 | - | |
| intel | ac_9462_firmware | * | |
| intel | ac_9462 | - | |
| intel | ac_9461_firmware | * | |
| intel | ac_9461 | - | |
| intel | ac_9260_firmware | * | |
| intel | ac_9260 | - | |
| intel | ac_8265_firmware | * | |
| intel | ac_8265 | - | |
| intel | ac_8260_firmware | * | |
| intel | ac_8260 | - | |
| intel | ac_3168_firmware | * | |
| intel | ac_3168 | - | |
| intel | 7265_firmware | * | |
| intel | 7265 | - | |
| intel | ac_3165_firmware | * | |
| intel | ac_3165 | - | |
| intel | ax1675_firmware | * | |
| intel | ax1675 | - | |
| intel | ax1650_firmware | * | |
| intel | ax1650 | - | |
| intel | ac1550_firmware | * | |
| intel | ac1550 | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A41A8C-0D70-4EC8-BC88-AAA876CB5F09",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F226D74C-4A48-4AC0-A565-A00D555E27D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E88D9E-29D5-4CFE-B667-74C39E488E0B",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4649D446-130B-4B31-B9ED-BA7F9F7EEB8F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB80AB07-B842-4749-A133-6A55FEF280FA",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9903E2E-A670-40D4-8B9F-D2C0CFDBFC9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D507F8-70EE-4880-B669-CCE410465C07",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A0BF72A-4B7C-4C2B-B461-92762D5463C9",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E89EB0D-233A-486A-BDAE-F5726432CD7E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF8F2FE-CB8D-407D-914D-53AA38704613",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A11E55E8-5FA9-4ED7-AB61-03F22EE1759B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB41ECC4-0CD4-4E1B-A940-CEBE7B637BFC",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F38F4A4-7979-495C-BCED-359DDBE24CF3",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8662B65E-418E-40CF-95DE-9E5FA64B791F",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E5286C-C0A9-442F-B9CB-222B9F2D37AC",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5B2BCE-2D8A-440C-B866-76E035314022",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74567DC-0E26-4EE9-A4E5-3575F9162A03",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F957A9E7-E2D2-48D7-8E4D-B264A72C59C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE5D3D6-2462-4833-89A6-9FF94A38822E",
              "versionEndExcluding": "22.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197A3DA1-B8EF-438F-B933-32253C43C8EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9076C2BD-41C4-4E9F-8CDE-0B155FFBA22A",
              "versionEndExcluding": "2.4.1541",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F407ACA-0952-4717-A302-2D5CEB6DB111",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "820056A9-122F-455D-AC52-84E46949A255",
              "versionEndExcluding": "2.4.1541",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B944F7-4A5F-41D0-A910-6F978F66CAA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E9A0A8-99E6-4407-A92E-AB7128E8F7AA",
              "versionEndExcluding": "2.4.1541",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2809983C-2D12-4353-BC94-D0E177CD214F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el software para algunos Intel\u00ae PROSet / Wireless WiFi y Killer\u2122 WiFi en Windows 10 puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0079",
  "lastModified": "2024-11-21T05:41:48.593",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-17T20:15:08.943",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  CERTFR-2021-AVI-858
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
        | Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel® NUC Kit: NUC8i7HNK, NUC8i7HVK | ||
| Intel | N/A | Intel® Pentium® Processor N Series | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series | ||
| Intel | N/A | Intel® NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7 | ||
| Intel | N/A | 700-series Ethernet Adapters | ||
| Intel | N/A | Intel SSD DC P4608 Series toutes versions. | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC710. | ||
| Intel | N/A | Intel® NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Pentium® Silver Processor Series | ||
| Intel | N/A | Intel® P4510 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX210 | ||
| Intel | N/A | All Intel® oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions antérieures à 2021.1 Beta 10. | ||
| Intel | N/A | Intel® Pentium® Processor J Series, N Series | ||
| Intel | N/A | Intel SSD DC P4600 Series toutes versions. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3168 | ||
| Intel | N/A | Safestring library maintained by Intel® avant le commit avec l'id efbd4066ea215f03342c1f0e5888102badf14477 | ||
| Intel | N/A | Intel® NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W | ||
| Intel | N/A | Intel® P4618 series versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Ethernet 500 Series Controllers driver pour Linux versions antérieures à 3.17.3. | ||
| Intel | N/A | Intel® NUC Kit: NUC6CAYH, NUC6CAYS | ||
| Intel | N/A | Intel® NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA | ||
| Intel | N/A | Intel® Wi-Fi 6 AX201 | ||
| Intel | N/A | 10th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions antérieures à 1.78.2.0.7. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8265 | ||
| Intel | N/A | Intel® Distribution of OpenVINO™ Toolkit versions antérieures à 2021.4. | ||
| Intel | N/A | Intel SSD D5-P4420 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Kit - NUC11PHKi7C | ||
| Intel | N/A | Intel® RealSense™ D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.22. | ||
| Intel | N/A | Intel® oneAPI Rendering Toolkit versions antérieures à 2021.2. | ||
| Intel | N/A | Intel® Wireless-AC 9462 | ||
| Intel | N/A | Intel® P4511 series (M.2) versions antérieures à VDV10384. | ||
| Intel | N/A | Intel® Serial IO driver pour Intel® NUC 11 Gen versions antérieures à 30.100.2104.1. | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNKTC | ||
| Intel | N/A | Intel® P4510 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC | ||
| Intel | N/A | Intel® Wireless-AC 9560 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit: LAPBC510, LAPBC710 | ||
| Intel | N/A | Intel® NUC 8 Rugged Kit NUC8CCHKR | ||
| Intel | N/A | Intel® Wi-Fi 6E AX210 | ||
| Intel | N/A | Intel® NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA | ||
| Intel | N/A | Intel® NUC Kit NUC7i3DNHE, NUC7i3DNKE | ||
| Intel | N/A | 7th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel® Graphics Driver pour Windows® 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions antérieures à 21.10. | ||
| Intel | N/A | Intel® NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA | ||
| Intel | N/A | Intel® Xeon® Processor W Family | ||
| Intel | N/A | Intel® Atom® Processor A Series | ||
| Intel | N/A | Intel® EMA versions antérieures à 1.5.0. | ||
| Intel | N/A | Intel® Ethernet Diagnostic Driver pour Windows versions antérieures à 1.4.0.10. | ||
| Intel | N/A | Intel® Wireless 7265 (Rev D) Family | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW | ||
| Intel | N/A | Intel® NUC Board NUC8CCHB | ||
| Intel | N/A | Intel® Graphics non DCH Drivers pour Windows 10 versions antérieures à 100.9416. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver installer pour Windows versions antérieures à 1.4.0.21. | ||
| Intel | N/A | Intel® P4511 series (EDSFF) versions antérieures à VDV10284. | ||
| Intel | N/A | Killer™ Wi-Fi 6 AX1650 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions antérieures à 1.78.4.0.4. | ||
| Intel | N/A | Intel® Wi-Fi 6 AX200 | ||
| Intel | N/A | Intel® NUC M15 Laptop Kit - LAPBC510. | ||
| Intel | N/A | Intel® NUC Board NUC7i3DNBE | ||
| Intel | N/A | Intel® NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB | ||
| Intel | N/A | Killer™ Wireless-AC 1550 | ||
| Intel | N/A | Intel® NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7 | ||
| Intel | N/A | Intel® NUC 8 Home, a Mini PC avec Windows® 10: NUC8i3CYSM, NUC8i3CYSN | ||
| Intel | N/A | 3rd Generation Intel® Xeon® Scalable Processors | ||
| Intel | N/A | Intel SSD D7-P5608 Series versions antérieures à 2CV1R106. | ||
| Intel | N/A | Intel® Celeron® Processor J Series, N Series | ||
| Intel | N/A | Intel® NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB | ||
| Intel | N/A | Intel® Atom® Processor E3900 Series | ||
| Intel | N/A | Intel® SSD DC D4512 versions antérieures à ET10. | ||
| Intel | N/A | Intel® Core™ X-series Processors | ||
| Intel | N/A | Intel® NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH | ||
| Intel | N/A | Intel® Wireless-AC 9260 | ||
| Intel | N/A | Intel® Graphics DCH Drivers pour Windows 10 versions antérieures à 27.20.100.9316. | ||
| Intel | N/A | Intel® NUC 8 Pro Board NUC8i3PNB | ||
| Intel | N/A | Intel® SSD D3-S4510 Series (SFF, M.2) versions antérieures à XCV10140. | ||
| Intel | N/A | Killer™ Wi-Fi 6E AX1675 | ||
| Intel | N/A | Intel® NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions antérieures à 1.78.1.1. | ||
| Intel | N/A | Intel® P4610 series (U.2) versions antérieures à VDV10182. | ||
| Intel | N/A | Intel® Wireless-AC 9461 | ||
| Intel | N/A | Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 août 2021. | ||
| Intel | N/A | Intel® NUC 7 Essential, a Mini PC avec Windows® 10 - NUC7CJYSAL | ||
| Intel | N/A | Intel® VTune™ Profiler versions antérieures à 2021.3.0. | ||
| Intel | N/A | Intel® NUC Kit: NUC7CJYH, NUC7PJYH | ||
| Intel | N/A | 11th Generation Intel® Core™ Processors | ||
| Intel | N/A | Intel SSD DC P4500 Series toutes versions. | ||
| Intel | N/A | Intel® NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK | ||
| Intel | N/A | Intel SSD D5-P4326 Series toutes versions. | ||
| Intel | N/A | Intel SSD DC P4501 Series toutes versions. | ||
| Intel | N/A | Intel® Thunderbolt™ 3 and 4 Windows DCH Drivers versions antérieures à 1.41.1054.0 | ||
| Intel | N/A | Intel® Celeron® Processor N Series | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i3DNHNC | ||
| Intel | N/A | Intel® Core™ i7-8706G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel SSD D5-P4320 Series toutes versions. | ||
| Intel | N/A | Intel® Administrative Tools pour Intel® Network Adapters driver pour Windows versions antérieures à 1.4.0.15. | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 8260 | ||
| Intel | N/A | Intel® Battery Life Diagnostic Tool versions antérieures à 1.2. | ||
| Intel | N/A | Intel® NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA | ||
| Intel | N/A | Intel® NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX | ||
| Intel | N/A | Intel SSD D7-P5500 Series versions antérieures à 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029. | ||
| Intel | N/A | Intel® Xeon® Processor E3 v6 Family | ||
| Intel | N/A | Intel® oneAPI Base Toolkit versions antérieures à 2021.4.0. | ||
| Intel | N/A | Intel® Thunderbolt™ non-DCH Driver toutes versions pour Windows. | ||
| Intel | N/A | Intel® NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA | ||
| Intel | N/A | Intel® NUC 7 Business, a Mini PC avec Windows® 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE | ||
| Intel | N/A | Intel® Xeon® Processor E Family | ||
| Intel | N/A | Intel SSD D7-P5600 Series versions antérieures à 1.2.0, 2CV1L029 and 2CV1C030. | ||
| Intel | N/A | Intel® Atom® Processor C3000 | ||
| Intel | N/A | Intel® Dual Band Wireless-AC 3165 | ||
| Intel | N/A | 810-series Ethernet Adapters | ||
| Intel | N/A | Intel® Iris® Xe MAX Dedicated Graphics Drivers pour Windows 10 versions antérieures à 27.20.100.9466. | ||
| Intel | N/A | Intel® Core™ i5-8305G Processor avec Radeon™ RX Vega M GL graphics versions antérieures à 21.10. | ||
| Intel | N/A | Intel® Pentium® Processor Silver Series/ J&N Series - Refresh | ||
| Intel | N/A | Intel® NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7 | 
References
        {
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel\u00ae NUC Kit: NUC8i7HNK, NUC8i7HVK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Pro Kit: NUC11TNHi3, NUC11TNHi30L, NUC11TNHi30P, NUC11TNHi5, NUC11TNHi50L, NUC11TNHi50W, NUC11TNHi7, NUC11TNHi70L, NUC11TNHi70Q, NUC11TNKi3, NUC11TNKi5, NUC11TNKi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "700-series Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4608 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC710.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC8i3BEH, NUC8i3BEHS, NUC8i3BEK, NUC8i5BEH, NUC8i5BEHS, NUC8i5BEK, NUC8i7BEH, NUC8i7BEK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Mainstream-G mini PC: NUC8i5INH, NUC8i7INH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Silver Processor Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4510 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "All Intel\u00ae oneAPI Toolkits (Base, HPC, IoT, AI, DLFD, Rendering) versions ant\u00e9rieures \u00e0 2021.1 Beta 10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor J Series, N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4600 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 3168",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Safestring library maintained by Intel\u00ae avant le commit avec l\u0027id efbd4066ea215f03342c1f0e5888102badf14477",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Compute Element: CM11EBC4W, CM11EBi38W, CM11EBi58W, CM11EBi716W",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4618 series versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Ethernet 500 Series Controllers driver pour Linux versions ant\u00e9rieures \u00e0 3.17.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC6CAYH, NUC6CAYS",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Home - a Mini PC avec Windows 10: NUC8i3BEHFA, NUC8i5BEHFA, NUC8i5BEKPA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX201",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "10th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC10i3FN, NUC10i5FN, NUC10i7FN versions ant\u00e9rieures \u00e0 1.78.2.0.7.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 8265",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Distribution of OpenVINO\u2122 Toolkit versions ant\u00e9rieures \u00e0 2021.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4420 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Enthusiast Kit - NUC11PHKi7C",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae RealSense\u2122 D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.22.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae oneAPI Rendering Toolkit versions ant\u00e9rieures \u00e0 2021.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9462",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4511 series (M.2) versions ant\u00e9rieures \u00e0 VDV10384.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Serial IO driver pour Intel\u00ae NUC 11 Gen versions ant\u00e9rieures \u00e0 30.100.2104.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNKTC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4510 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Business, a Mini PC avec Windows 10 - NUC8i7HNKQC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9560",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit: LAPBC510, LAPBC710",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Rugged Kit NUC8CCHKR",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6E AX210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Enthusiast Mini PC - NUC11PHKi7CAA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit NUC7i3DNHE, NUC7i3DNKE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "7th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics Driver pour Windows\u00ae 10 64-bit pour NUC8i7HNK, NUC8i7HVK versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Performance Mini PC - NUC11PAQi50WA, NUC11PAQi70QA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor W Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor A Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae EMA versions ant\u00e9rieures \u00e0 1.5.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Ethernet Diagnostic Driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless 7265 (Rev D) Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7HVKVA, NUC8i7HVKVAW",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Board NUC8CCHB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics non DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 100.9416.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver installer pour Windows versions ant\u00e9rieures \u00e0 1.4.0.21.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4511 series (EDSFF) versions ant\u00e9rieures \u00e0 VDV10284.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wi-Fi 6 AX1650",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC8i3BE, NUC8i5BE, NUC8i7BE versions ant\u00e9rieures \u00e0 1.78.4.0.4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wi-Fi 6 AX200",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC M15 Laptop Kit - LAPBC510.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Board NUC7i3DNBE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 9 Pro Compute Element: NUC9V7QNB, NUC9VXQNB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wireless-AC 1550",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Pro Board: NUC11TNBi3, NUC11TNBi5, NUC11TNBi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Home, a Mini PC avec Windows\u00ae 10: NUC8i3CYSM, NUC8i3CYSN",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "3rd Generation Intel\u00ae Xeon\u00ae Scalable Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5608 Series versions ant\u00e9rieures \u00e0 2CV1R106.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Celeron\u00ae Processor J Series, N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Compute Element: CM8CCB, CM8i3CB, CM8i5CB, CM8i7CB, CM8PCB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor E3900 Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae SSD DC D4512 versions ant\u00e9rieures \u00e0 ET10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 X-series Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Mainstream-G kit: NUC8i5INH, NUC8i7INH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9260",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Graphics DCH Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9316.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Pro Board NUC8i3PNB",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae SSD D3-S4510 Series (SFF, M.2) versions ant\u00e9rieures \u00e0 XCV10140.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Killer\u2122 Wi-Fi 6E AX1675",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC HDMI Firmware Update Tool pour NUC7i3DN, NUC7i5DN, NUC7i7DN versions ant\u00e9rieures \u00e0 1.78.1.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae P4610 series (U.2) versions ant\u00e9rieures \u00e0 VDV10182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Wireless-AC 9461",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Crypto API Toolkit pour Intel(R) SGX downloaded avant le 2 ao\u00fbt 2021.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Essential, a Mini PC avec Windows\u00ae 10 - NUC7CJYSAL",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae VTune\u2122 Profiler versions ant\u00e9rieures \u00e0 2021.3.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC Kit: NUC7CJYH, NUC7PJYH",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "11th Generation Intel\u00ae Core\u2122 Processors",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4500 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Pro Kit: NUC8i3PNH, NUC8i3PNK",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4326 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DC P4501 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Thunderbolt\u2122 3 and 4 Windows DCH Drivers versions ant\u00e9rieures \u00e0 1.41.1054.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Celeron\u00ae Processor N Series",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i3DNHNC",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 i7-8706G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D5-P4320 Series toutes versions.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Administrative Tools pour Intel\u00ae Network Adapters driver pour Windows versions ant\u00e9rieures \u00e0 1.4.0.15.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 8260",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Battery Life Diagnostic Tool versions ant\u00e9rieures \u00e0 1.2.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 10 Performance kit: NUC10i3FNH, NUC10i3FNHF, NUC10i3FNK, NUC10i5FNH, NUC10i5FNHF, NUC10i5FNHJ, NUC10i5FNK, NUC10i5FNKP, NUC10i7FNH, NUC10i7FNHC, NUC10i7FNK, NUC10i7FNKP, NUC10i3FNHFA, NUC10i3FNHJA, NUC10i5FNHCA, NUC10i5FNHJA, NUC10i5FNKPA, NUC10i7FNHAA, NUC10i7FNHJA, NUC10i7FNKPA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 9 Pro Kit: NUC9V7QNX, NUC9VXQNX",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5500 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1C030, 2CV1R106 and 2CV1L029.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor E3 v6 Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2021.4.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Thunderbolt\u2122 non-DCH Driver toutes versions pour Windows.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 8 Enthusiast, a Mini PC avec Windows 10: NUC8i7BEHGA, NUC8i7BEKQA",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 7 Business, a Mini PC avec Windows\u00ae 10 Pro - NUC7i5DNKPC, NUC7i5DNBE, NUC7i5DNHE, NUC7i5DNKE",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Xeon\u00ae Processor E Family",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD D7-P5600 Series versions ant\u00e9rieures \u00e0 1.2.0, 2CV1L029 and 2CV1C030.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Atom\u00ae Processor C3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Dual Band Wireless-AC 3165",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "810-series Ethernet Adapters",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Iris\u00ae Xe MAX Dedicated Graphics Drivers pour Windows 10 versions ant\u00e9rieures \u00e0 27.20.100.9466.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Core\u2122 i5-8305G Processor avec Radeon\u2122 RX Vega M GL graphics versions ant\u00e9rieures \u00e0 21.10.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae Pentium\u00ae Processor Silver Series/ J\u0026N Series\u200b - Refresh",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel\u00ae NUC 11 Performance kit: NUC11PAHi3, NUC11PAHi5, NUC11PAHi7, NUC11PAKi3, NUC11PAKi5, NUC11PAKi7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0063"
    },
    {
      "name": "CVE-2020-12981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12981"
    },
    {
      "name": "CVE-2020-12987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12987"
    },
    {
      "name": "CVE-2021-0157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0157"
    },
    {
      "name": "CVE-2020-12899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12899"
    },
    {
      "name": "CVE-2021-33062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33062"
    },
    {
      "name": "CVE-2021-0199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0199"
    },
    {
      "name": "CVE-2021-33089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33089"
    },
    {
      "name": "CVE-2020-12986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12986"
    },
    {
      "name": "CVE-2021-0135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0135"
    },
    {
      "name": "CVE-2021-0065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0065"
    },
    {
      "name": "CVE-2021-0078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0078"
    },
    {
      "name": "CVE-2020-8741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8741"
    },
    {
      "name": "CVE-2021-0053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0053"
    },
    {
      "name": "CVE-2021-33106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33106"
    },
    {
      "name": "CVE-2021-0198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0198"
    },
    {
      "name": "CVE-2021-0096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0096"
    },
    {
      "name": "CVE-2021-0158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0158"
    },
    {
      "name": "CVE-2021-33092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33092"
    },
    {
      "name": "CVE-2020-12983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12983"
    },
    {
      "name": "CVE-2021-0082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0082"
    },
    {
      "name": "CVE-2021-0079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0079"
    },
    {
      "name": "CVE-2021-33094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33094"
    },
    {
      "name": "CVE-2021-33090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33090"
    },
    {
      "name": "CVE-2020-12893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12893"
    },
    {
      "name": "CVE-2020-12982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12982"
    },
    {
      "name": "CVE-2021-0071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0071"
    },
    {
      "name": "CVE-2020-12980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12980"
    },
    {
      "name": "CVE-2021-33095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33095"
    },
    {
      "name": "CVE-2020-12963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12963"
    },
    {
      "name": "CVE-2021-0151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0151"
    },
    {
      "name": "CVE-2020-12902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12902"
    },
    {
      "name": "CVE-2021-33098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
    },
    {
      "name": "CVE-2021-33118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33118"
    },
    {
      "name": "CVE-2021-0148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0148"
    },
    {
      "name": "CVE-2021-0121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0121"
    },
    {
      "name": "CVE-2021-33071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33071"
    },
    {
      "name": "CVE-2021-33105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33105"
    },
    {
      "name": "CVE-2021-33058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33058"
    },
    {
      "name": "CVE-2021-0200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0200"
    },
    {
      "name": "CVE-2021-33097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33097"
    },
    {
      "name": "CVE-2020-12898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12898"
    },
    {
      "name": "CVE-2021-0152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0152"
    },
    {
      "name": "CVE-2021-0069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0069"
    },
    {
      "name": "CVE-2021-0197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0197"
    },
    {
      "name": "CVE-2020-12901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12901"
    },
    {
      "name": "CVE-2021-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0013"
    },
    {
      "name": "CVE-2020-12985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12985"
    },
    {
      "name": "CVE-2020-12892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12892"
    },
    {
      "name": "CVE-2021-0075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0075"
    },
    {
      "name": "CVE-2021-0120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0120"
    },
    {
      "name": "CVE-2021-0146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0146"
    },
    {
      "name": "CVE-2020-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12900"
    },
    {
      "name": "CVE-2021-33087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33087"
    },
    {
      "name": "CVE-2021-33086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33086"
    },
    {
      "name": "CVE-2020-12904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12904"
    },
    {
      "name": "CVE-2021-33091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33091"
    },
    {
      "name": "CVE-2021-33059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33059"
    },
    {
      "name": "CVE-2021-33088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33088"
    },
    {
      "name": "CVE-2021-0064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0064"
    },
    {
      "name": "CVE-2020-12897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12897"
    },
    {
      "name": "CVE-2020-12894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12894"
    },
    {
      "name": "CVE-2020-12905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12905"
    },
    {
      "name": "CVE-2021-33063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33063"
    },
    {
      "name": "CVE-2020-12903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12903"
    },
    {
      "name": "CVE-2021-33073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33073"
    },
    {
      "name": "CVE-2021-33093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33093"
    },
    {
      "name": "CVE-2021-0110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0110"
    },
    {
      "name": "CVE-2020-12964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12964"
    },
    {
      "name": "CVE-2020-12895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12895"
    }
  ],
  "initial_release_date": "2021-11-10T00:00:00",
  "last_revision_date": "2021-11-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-858",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-11-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00393 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00393.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00560 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00481 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00481.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00551 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00551.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00535 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00535.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00565 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00565.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00524 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00524.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00567 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00528 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00547 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00562 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00562.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00584 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00584.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00556 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00569 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00569.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00557 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00540 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00540.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00533 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00533.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00555 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00509 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00564 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00564.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00538 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00538.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00554 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00554.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00568 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00568.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00566 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00482 du 09 novembre 2021",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00482.html"
    }
  ]
}
  ghsa-gx34-gwqq-m8fg
Vulnerability from github
Published
2022-05-24 19:21
    Modified
2022-05-24 19:21
    
        VLAI Severity ?
      
      Details
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
{
  "affected": [],
  "aliases": [
    "CVE-2021-0079"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2021-11-17T20:15:00Z",
    "severity": "MODERATE"
  },
  "details": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
  "id": "GHSA-gx34-gwqq-m8fg",
  "modified": "2022-05-24T19:21:00Z",
  "published": "2022-05-24T19:21:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0079"
    },
    {
      "type": "WEB",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  gsd-2021-0079
Vulnerability from gsd
Modified
2023-12-13 01:23
      Details
        
          Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2021-0079",
    "description": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
    "id": "GSD-2021-0079"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2021-0079"
      ],
      "details": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
      "id": "GSD-2021-0079",
      "modified": "2023-12-13T01:23:07.976705Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secure@intel.com",
        "ID": "CVE-2021-0079",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "See references"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "denial of service"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html",
            "refsource": "MISC",
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:7265_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:7265:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "22.40",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "2.4.1541",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "2.4.1541",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:intel:ac1550_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "2.4.1541",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:intel:ac1550:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0079"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html",
              "refsource": "MISC",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "exploitabilityScore": 6.5,
          "impactScore": 6.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 2.8,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2021-11-19T20:14Z",
      "publishedDate": "2021-11-17T20:15Z"
    }
  }
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…