All the vulnerabilites related to intel - killer_wi-fi_6e_ax1675
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2021/05/11/12Mailing List, Third Party Advisory
cve@mitre.orghttps://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.mdThird Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/06/msg00019.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/06/msg00020.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWuThird Party Advisory
cve@mitre.orghttps://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63Third Party Advisory
cve@mitre.orghttps://www.fragattacks.comExploit, Third Party Advisory
cve@mitre.orghttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/05/11/12Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.mdThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/06/msg00019.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/06/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWuThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.fragattacks.comExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.htmlThird Party Advisory
Impacted products
Vendor Product Version
ieee ieee_802.11 *
linux mac80211 -
debian debian_linux 9.0
arista c-100_firmware -
arista c-100 -
arista c-110_firmware -
arista c-110 -
arista c-120_firmware -
arista c-120 -
arista c-130_firmware -
arista c-130 -
arista c-200_firmware -
arista c-200 -
arista c-230_firmware -
arista c-230 -
arista c-235_firmware -
arista c-235 -
arista c-250_firmware -
arista c-250 -
arista c-260_firmware -
arista c-260 -
arista c-65_firmware -
arista c-65 -
arista c-75_firmware -
arista c-75 -
arista o-105_firmware -
arista o-105 -
arista o-90_firmware -
arista o-90 -
arista w-118_firmware -
arista w-118 -
arista w-68_firmware -
arista w-68 -
cisco 1100_firmware -
cisco 1100 -
cisco 1100-4p_firmware -
cisco 1100-4p -
cisco 1100-8p_firmware -
cisco 1100-8p -
cisco 1101-4p_firmware -
cisco 1101-4p -
cisco 1109-2p_firmware -
cisco 1109-2p -
cisco 1109-4p_firmware -
cisco 1109-4p -
cisco aironet_1532_firmware -
cisco aironet_1532 -
cisco aironet_1542d_firmware -
cisco aironet_1542d -
cisco aironet_1542i_firmware -
cisco aironet_1542i -
cisco aironet_1552_firmware -
cisco aironet_1552 -
cisco aironet_1552h_firmware -
cisco aironet_1552h -
cisco aironet_1572_firmware -
cisco aironet_1572 -
cisco aironet_1702_firmware -
cisco aironet_1702 -
cisco aironet_1800_firmware -
cisco aironet_1800 -
cisco aironet_1800i_firmware -
cisco aironet_1800i -
cisco aironet_1810_firmware -
cisco aironet_1810 -
cisco aironet_1810w_firmware -
cisco aironet_1810w -
cisco aironet_1815_firmware -
cisco aironet_1815 -
cisco aironet_1815i_firmware -
cisco aironet_1815i -
cisco aironet_1832_firmware -
cisco aironet_1832 -
cisco aironet_1842_firmware -
cisco aironet_1842 -
cisco aironet_1852_firmware -
cisco aironet_1852 -
cisco aironet_2702_firmware -
cisco aironet_2702 -
cisco aironet_2800_firmware -
cisco aironet_2800 -
cisco aironet_2800e_firmware -
cisco aironet_2800e -
cisco aironet_2800i_firmware -
cisco aironet_2800i -
cisco aironet_3702_firmware -
cisco aironet_3702 -
cisco aironet_3800_firmware -
cisco aironet_3800 -
cisco aironet_3800e_firmware -
cisco aironet_3800e -
cisco aironet_3800i_firmware -
cisco aironet_3800i -
cisco aironet_3800p_firmware -
cisco aironet_3800p -
cisco aironet_4800_firmware -
cisco aironet_4800 -
cisco aironet_ap803_firmware -
cisco aironet_ap803 -
cisco aironet_iw3702_firmware -
cisco aironet_iw3702 -
cisco catalyst_9105_firmware -
cisco catalyst_9105 -
cisco catalyst_9105axi_firmware -
cisco catalyst_9105axi -
cisco catalyst_9105axw_firmware -
cisco catalyst_9105axw -
cisco catalyst_9115_firmware -
cisco catalyst_9115 -
cisco catalyst_9115_ap_firmware -
cisco catalyst_9115_ap -
cisco catalyst_9115axe_firmware -
cisco catalyst_9115axe -
cisco catalyst_9115axi_firmware -
cisco catalyst_9115axi -
cisco catalyst_9117_firmware -
cisco catalyst_9117 -
cisco catalyst_9117_ap_firmware -
cisco catalyst_9117_ap -
cisco catalyst_9117axi_firmware -
cisco catalyst_9117axi -
cisco catalyst_9120_firmware -
cisco catalyst_9120 -
cisco catalyst_9120_ap_firmware -
cisco catalyst_9120_ap -
cisco catalyst_9120axe_firmware -
cisco catalyst_9120axe -
cisco catalyst_9120axi_firmware -
cisco catalyst_9120axi -
cisco catalyst_9120axp_firmware -
cisco catalyst_9120axp -
cisco catalyst_9124_firmware -
cisco catalyst_9124 -
cisco catalyst_9124axd_firmware -
cisco catalyst_9124axd -
cisco catalyst_9124axi_firmware -
cisco catalyst_9124axi -
cisco catalyst_9130_firmware -
cisco catalyst_9130 -
cisco catalyst_9130_ap_firmware -
cisco catalyst_9130_ap -
cisco catalyst_9130axe_firmware -
cisco catalyst_9130axe -
cisco catalyst_9130axi_firmware -
cisco catalyst_9130axi -
cisco catalyst_iw6300_firmware -
cisco catalyst_iw6300 -
cisco catalyst_iw6300_ac_firmware -
cisco catalyst_iw6300_ac -
cisco catalyst_iw6300_dc_firmware -
cisco catalyst_iw6300_dc -
cisco catalyst_iw6300_dcw_firmware -
cisco catalyst_iw6300_dcw -
cisco esw6300_firmware -
cisco esw6300 -
cisco ip_phone_6861_firmware -
cisco ip_phone_6861 -
cisco ip_phone_8821_firmware -
cisco ip_phone_8821 -
cisco ip_phone_8832_firmware -
cisco ip_phone_8832 -
cisco ip_phone_8861_firmware -
cisco ip_phone_8861 -
cisco ip_phone_8865_firmware -
cisco ip_phone_8865 -
cisco ir829-2lte-ea-ak9_firmware -
cisco ir829-2lte-ea-ak9 -
cisco ir829-2lte-ea-bk9_firmware -
cisco ir829-2lte-ea-bk9 -
cisco ir829-2lte-ea-ek9_firmware -
cisco ir829-2lte-ea-ek9 -
cisco ir829gw-lte-ga-ck9_firmware -
cisco ir829gw-lte-ga-ck9 -
cisco ir829gw-lte-ga-ek9_firmware -
cisco ir829gw-lte-ga-ek9 -
cisco ir829gw-lte-ga-sk9_firmware -
cisco ir829gw-lte-ga-sk9 -
cisco ir829gw-lte-ga-zk9_firmware -
cisco ir829gw-lte-ga-zk9 -
cisco ir829gw-lte-na-ak9_firmware -
cisco ir829gw-lte-na-ak9 -
cisco ir829gw-lte-vz-ak9_firmware -
cisco ir829gw-lte-vz-ak9 -
cisco meraki_gr10_firmware -
cisco meraki_gr10 -
cisco meraki_gr60_firmware -
cisco meraki_gr60 -
cisco meraki_mr12_firmware -
cisco meraki_mr12 -
cisco meraki_mr20_firmware -
cisco meraki_mr20 -
cisco meraki_mr26_firmware -
cisco meraki_mr26 -
cisco meraki_mr30h_firmware -
cisco meraki_mr30h -
cisco meraki_mr32_firmware -
cisco meraki_mr32 -
cisco meraki_mr33_firmware -
cisco meraki_mr33 -
cisco meraki_mr34_firmware -
cisco meraki_mr34 -
cisco meraki_mr36_firmware -
cisco meraki_mr36 -
cisco meraki_mr42_firmware -
cisco meraki_mr42 -
cisco meraki_mr42e_firmware -
cisco meraki_mr42e -
cisco meraki_mr44_firmware -
cisco meraki_mr44 -
cisco meraki_mr45_firmware -
cisco meraki_mr45 -
cisco meraki_mr46_firmware -
cisco meraki_mr46 -
cisco meraki_mr46e_firmware -
cisco meraki_mr46e -
cisco meraki_mr52_firmware -
cisco meraki_mr52 -
cisco meraki_mr53_firmware -
cisco meraki_mr53 -
cisco meraki_mr53e_firmware -
cisco meraki_mr53e -
cisco meraki_mr55_firmware -
cisco meraki_mr55 -
cisco meraki_mr56_firmware -
cisco meraki_mr56 -
cisco meraki_mr62_firmware -
cisco meraki_mr62 -
cisco meraki_mr66_firmware -
cisco meraki_mr66 -
cisco meraki_mr70_firmware -
cisco meraki_mr70 -
cisco meraki_mr72_firmware -
cisco meraki_mr72 -
cisco meraki_mr74_firmware -
cisco meraki_mr74 -
cisco meraki_mr76_firmware -
cisco meraki_mr76 -
cisco meraki_mr84_firmware -
cisco meraki_mr84 -
cisco meraki_mr86_firmware -
cisco meraki_mr86 -
cisco meraki_mx64w_firmware -
cisco meraki_mx64w -
cisco meraki_mx65w_firmware -
cisco meraki_mx65w -
cisco meraki_mx67cw_firmware -
cisco meraki_mx67cw -
cisco meraki_mx67w_firmware -
cisco meraki_mx67w -
cisco meraki_mx68cw_firmware -
cisco meraki_mx68cw -
cisco meraki_mx68w_firmware -
cisco meraki_mx68w -
cisco meraki_z3_firmware -
cisco meraki_z3 -
cisco meraki_z3c_firmware -
cisco meraki_z3c -
cisco webex_board_55_firmware -
cisco webex_board_55 -
cisco webex_board_55s_firmware -
cisco webex_board_55s -
cisco webex_board_70_firmware -
cisco webex_board_70 -
cisco webex_board_70s_firmware -
cisco webex_board_70s -
cisco webex_board_85s_firmware -
cisco webex_board_85s -
cisco webex_dx70_firmware -
cisco webex_dx70 -
cisco webex_dx80_firmware -
cisco webex_dx80 -
cisco webex_room_55_firmware -
cisco webex_room_55 -
cisco webex_room_55_dual_firmware -
cisco webex_room_55_dual -
cisco webex_room_70_firmware -
cisco webex_room_70 -
cisco webex_room_70_dual_firmware -
cisco webex_room_70_dual -
cisco webex_room_70_dual_g2_firmware -
cisco webex_room_70_dual_g2 -
cisco webex_room_70_single_firmware -
cisco webex_room_70_single -
cisco webex_room_70_single_g2_firmware -
cisco webex_room_70_single_g2 -
cisco webex_room_kit_firmware -
cisco webex_room_kit -
cisco webex_room_kit_mini_firmware -
cisco webex_room_kit_mini -
intel ac_8260_firmware -
intel ac_8260 -
intel ac_8265_firmware -
intel ac_8265 -
intel ac_9260_firmware -
intel ac_9260 -
intel ac_9560_firmware -
intel ac_9560 -
intel killer_ac_1550_firmware -
intel killer_ac_1550 -
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel proset_ac_3165_firmware -
intel proset_ac_3165 -
intel proset_ac_3168_firmware -
intel proset_ac_3168 -
intel proset_ac_8260_firmware -
intel proset_ac_8260 -
intel proset_ac_8265_firmware -
intel proset_ac_8265 -
intel proset_ac_9260_firmware -
intel proset_ac_9260 -
intel proset_ac_9461_firmware -
intel proset_ac_9461 -
intel proset_ac_9462_firmware -
intel proset_ac_9462 -
intel proset_ac_9560_firmware -
intel proset_ac_9560 -
intel proset_wi-fi_6_ax200_firmware -
intel proset_wi-fi_6_ax200 -
intel proset_wi-fi_6_ax201_firmware -
intel proset_wi-fi_6_ax201 -
intel proset_wi-fi_6e_ax210_firmware -
intel proset_wi-fi_6e_ax210 -
intel proset_wireless_7265_\(rev_d\)_firmware -
intel proset_wireless_7265_\(rev_d\) -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C083CF-3D4D-4AF0-8461-835F6AC264CC",
              "versionEndExcluding": "4.4.271",
              "versionStartIncluding": "4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11580478-2F79-45B8-9BC0-FEF28259A4F5",
              "versionEndExcluding": "4.9.271",
              "versionStartIncluding": "4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E",
              "versionEndExcluding": "4.14.235",
              "versionStartIncluding": "4.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0",
              "versionEndExcluding": "4.19.193",
              "versionStartIncluding": "4.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65",
              "versionEndExcluding": "5.4.124",
              "versionStartIncluding": "5.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3",
              "versionEndExcluding": "5.10.42",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903",
              "versionEndExcluding": "5.12.9",
              "versionStartIncluding": "5.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed."
    },
    {
      "lang": "es",
      "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que todos los fragmentos de una trama est\u00e9n cifrados con la misma clave. Un adversario puede abusar de esto para descifrar fragmentos seleccionados cuando otro dispositivo env\u00eda tramas fragmentadas y la clave de cifrado WEP, CCMP o GCMP es peri\u00f3dicamente renovada"
    }
  ],
  "id": "CVE-2020-24587",
  "lastModified": "2024-11-21T05:15:05.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.2,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-11T20:15:08.580",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:51
Summary
Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una excepci\u00f3n no detectada para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-26586",
  "lastModified": "2024-11-21T07:51:48.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:44.547",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-248"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2021/05/11/12Mailing List, Third Party Advisory
cve@mitre.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdfThird Party Advisory
cve@mitre.orghttps://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.mdThird Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/06/msg00019.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/06/msg00020.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWuThird Party Advisory
cve@mitre.orghttps://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63Third Party Advisory
cve@mitre.orghttps://www.fragattacks.comExploit, Third Party Advisory
cve@mitre.orghttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/05/11/12Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.mdThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/06/msg00019.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/06/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWuThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.fragattacks.comExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.htmlThird Party Advisory
Impacted products
Vendor Product Version
ieee ieee_802.11 *
linux mac80211 -
microsoft windows_10 -
microsoft windows_10 20h2
microsoft windows_10 1607
microsoft windows_10 1803
microsoft windows_10 1809
microsoft windows_10 1909
microsoft windows_10 2004
microsoft windows_7 -
microsoft windows_8.1 -
microsoft windows_rt_8.1 -
microsoft windows_server_2008 -
microsoft windows_server_2008 r2
microsoft windows_server_2012 -
microsoft windows_server_2012 -
microsoft windows_server_2016 -
microsoft windows_server_2016 2004
microsoft windows_server_2019 -
debian debian_linux 9.0
siemens scalance_w1748-1_firmware -
siemens scalance_w1748-1 -
siemens scalance_w1750d_firmware -
siemens scalance_w1750d -
siemens scalance_w1788-1_firmware -
siemens scalance_w1788-1 -
siemens scalance_w1788-2_firmware -
siemens scalance_w1788-2 -
siemens scalance_w1788-2_firmware -
siemens scalance_w1788-2 -
siemens scalance_w1788-2ia_firmware -
siemens scalance_w1788-2ia -
siemens scalance_w721-1_firmware -
siemens scalance_w721-1 -
siemens scalance_w722-1_firmware -
siemens scalance_w722-1 -
siemens scalance_w734-1_firmware -
siemens scalance_w734-1 -
siemens scalance_w738-1_firmware -
siemens scalance_w738-1 -
siemens scalance_w748-1_firmware -
siemens scalance_w748-1 -
siemens scalance_w748-1_firmware -
siemens scalance_w748-1 -
siemens scalance_w761-1_firmware -
siemens scalance_w761-1 -
siemens scalance_w774-1_firmware -
siemens scalance_w774-1 -
siemens scalance_w774-1_firmware -
siemens scalance_w774-1 -
siemens scalance_w778-1_firmware -
siemens scalance_w778-1 -
siemens scalance_w778-1_firmware -
siemens scalance_w778-1 -
siemens scalance_w786-1_firmware -
siemens scalance_w786-1 -
siemens scalance_w786-2_firmware -
siemens scalance_w786-2 -
siemens scalance_w786-2_firmware -
siemens scalance_w786-2 -
siemens scalance_w786-2ia_firmware -
siemens scalance_w786-2ia -
siemens scalance_w788-1_firmware -
siemens scalance_w788-1 -
siemens scalance_w788-1_firmware -
siemens scalance_w788-1 -
siemens scalance_w788-2_firmware -
siemens scalance_w788-2 -
siemens scalance_w788-2_firmware -
siemens scalance_w788-2 -
siemens scalance_w788-2_firmware -
siemens scalance_w788-2 -
siemens scalance_wam763-1_firmware -
siemens scalance_wam763-1 -
siemens scalance_wam766-1_firmware -
siemens scalance_wam766-1 -
siemens scalance_wam766-1_firmware -
siemens scalance_wam766-1 -
siemens scalance_wam766-1_6ghz_firmware -
siemens scalance_wam766-1_6ghz -
siemens scalance_wam766-1_6ghz_firmware -
siemens scalance_wam766-1_6ghz -
siemens scalance_wum763-1_firmware -
siemens scalance_wum763-1 -
siemens scalance_wum766-1_firmware -
siemens scalance_wum766-1 -
siemens scalance_wum766-1_6ghz_firmware -
siemens scalance_wum766-1_6ghz -
arista c-100_firmware -
arista c-100 -
arista c-110_firmware -
arista c-110 -
arista c-120_firmware -
arista c-120 -
arista c-130_firmware -
arista c-130 -
arista c-200_firmware -
arista c-200 -
arista c-230_firmware -
arista c-230 -
arista c-235_firmware -
arista c-235 -
arista c-250_firmware -
arista c-250 -
arista c-260_firmware -
arista c-260 -
arista c-65_firmware -
arista c-65 -
arista c-75_firmware -
arista c-75 -
arista o-105_firmware -
arista o-105 -
arista o-90_firmware -
arista o-90 -
arista w-118_firmware -
arista w-118 -
arista w-68_firmware -
arista w-68 -
cisco 1100_firmware -
cisco 1100 -
cisco 1100-4p_firmware -
cisco 1100-4p -
cisco 1100-8p_firmware -
cisco 1100-8p -
cisco 1101-4p_firmware -
cisco 1101-4p -
cisco 1109-2p_firmware -
cisco 1109-2p -
cisco 1109-4p_firmware -
cisco 1109-4p -
cisco aironet_1532_firmware -
cisco aironet_1532 -
cisco aironet_1542d_firmware -
cisco aironet_1542d -
cisco aironet_1542i_firmware -
cisco aironet_1542i -
cisco aironet_1800_firmware -
cisco aironet_1800 -
cisco aironet_1800i_firmware -
cisco aironet_1800i -
cisco aironet_1810_firmware -
cisco aironet_1810 -
cisco aironet_1810w_firmware -
cisco aironet_1810w -
cisco aironet_1815_firmware -
cisco aironet_1815 -
cisco aironet_1815i_firmware -
cisco aironet_1815i -
cisco aironet_1832_firmware -
cisco aironet_1832 -
cisco aironet_1842_firmware -
cisco aironet_1842 -
cisco aironet_1852_firmware -
cisco aironet_1852 -
cisco aironet_ap803_firmware -
cisco aironet_ap803 -
cisco aironet_iw3702_firmware -
cisco aironet_iw3702 -
cisco catalyst_9105_firmware -
cisco catalyst_9105 -
cisco catalyst_9105axi_firmware -
cisco catalyst_9105axi -
cisco catalyst_9105axw_firmware -
cisco catalyst_9105axw -
cisco catalyst_9115_firmware -
cisco catalyst_9115 -
cisco catalyst_9115_ap_firmware -
cisco catalyst_9115_ap -
cisco catalyst_9115axe_firmware -
cisco catalyst_9115axe -
cisco catalyst_9115axi_firmware -
cisco catalyst_9115axi -
cisco catalyst_9117_firmware -
cisco catalyst_9117 -
cisco catalyst_9117_ap_firmware -
cisco catalyst_9117_ap -
cisco catalyst_9117axi_firmware -
cisco catalyst_9117axi -
cisco catalyst_9120_firmware -
cisco catalyst_9120 -
cisco catalyst_9120_ap_firmware -
cisco catalyst_9120_ap -
cisco catalyst_9120axe_firmware -
cisco catalyst_9120axe -
cisco catalyst_9120axi_firmware -
cisco catalyst_9120axi -
cisco catalyst_9120axp_firmware -
cisco catalyst_9120axp -
cisco catalyst_9124_firmware -
cisco catalyst_9124 -
cisco catalyst_9124axd_firmware -
cisco catalyst_9124axd -
cisco catalyst_9124axi_firmware -
cisco catalyst_9124axi -
cisco catalyst_9130_firmware -
cisco catalyst_9130 -
cisco catalyst_9130_ap_firmware -
cisco catalyst_9130_ap -
cisco catalyst_9130axe_firmware -
cisco catalyst_9130axe -
cisco catalyst_9130axi_firmware -
cisco catalyst_9130axi -
cisco ip_phone_6861_firmware -
cisco ip_phone_6861 -
cisco ip_phone_8821_firmware -
cisco ip_phone_8821 -
cisco ip_phone_8832_firmware -
cisco ip_phone_8832 -
cisco ip_phone_8861_firmware -
cisco ip_phone_8861 -
cisco ip_phone_8865_firmware -
cisco ip_phone_8865 -
cisco ir829-2lte-ea-ak9_firmware -
cisco ir829-2lte-ea-ak9 -
cisco ir829-2lte-ea-bk9_firmware -
cisco ir829-2lte-ea-bk9 -
cisco ir829-2lte-ea-ek9_firmware -
cisco ir829-2lte-ea-ek9 -
cisco ir829gw-lte-ga-ck9_firmware -
cisco ir829gw-lte-ga-ck9 -
cisco ir829gw-lte-ga-ek9_firmware -
cisco ir829gw-lte-ga-ek9 -
cisco ir829gw-lte-ga-sk9_firmware -
cisco ir829gw-lte-ga-sk9 -
cisco ir829gw-lte-ga-zk9_firmware -
cisco ir829gw-lte-ga-zk9 -
cisco ir829gw-lte-na-ak9_firmware -
cisco ir829gw-lte-na-ak9 -
cisco ir829gw-lte-vz-ak9_firmware -
cisco ir829gw-lte-vz-ak9 -
cisco meraki_gr10_firmware -
cisco meraki_gr10 -
cisco meraki_gr60_firmware -
cisco meraki_gr60 -
cisco meraki_mr12_firmware -
cisco meraki_mr12 -
cisco meraki_mr20_firmware -
cisco meraki_mr20 -
cisco meraki_mr26_firmware -
cisco meraki_mr26 -
cisco meraki_mr30h_firmware -
cisco meraki_mr30h -
cisco meraki_mr32_firmware -
cisco meraki_mr32 -
cisco meraki_mr33_firmware -
cisco meraki_mr33 -
cisco meraki_mr34_firmware -
cisco meraki_mr34 -
cisco meraki_mr36_firmware -
cisco meraki_mr36 -
cisco meraki_mr42_firmware -
cisco meraki_mr42 -
cisco meraki_mr42e_firmware -
cisco meraki_mr42e -
cisco meraki_mr44_firmware -
cisco meraki_mr44 -
cisco meraki_mr45_firmware -
cisco meraki_mr45 -
cisco meraki_mr46_firmware -
cisco meraki_mr46 -
cisco meraki_mr46e_firmware -
cisco meraki_mr46e -
cisco meraki_mr52_firmware -
cisco meraki_mr52 -
cisco meraki_mr53_firmware -
cisco meraki_mr53 -
cisco meraki_mr53e_firmware -
cisco meraki_mr53e -
cisco meraki_mr55_firmware -
cisco meraki_mr55 -
cisco meraki_mr56_firmware -
cisco meraki_mr56 -
cisco meraki_mr62_firmware -
cisco meraki_mr62 -
cisco meraki_mr66_firmware -
cisco meraki_mr66 -
cisco meraki_mr70_firmware -
cisco meraki_mr70 -
cisco meraki_mr72_firmware -
cisco meraki_mr72 -
cisco meraki_mr74_firmware -
cisco meraki_mr74 -
cisco meraki_mr76_firmware -
cisco meraki_mr76 -
cisco meraki_mr84_firmware -
cisco meraki_mr84 -
cisco meraki_mr86_firmware -
cisco meraki_mr86 -
cisco meraki_mx64w_firmware -
cisco meraki_mx64w -
cisco meraki_mx65w_firmware -
cisco meraki_mx65w -
cisco meraki_mx67cw_firmware -
cisco meraki_mx67cw -
cisco meraki_mx67w_firmware -
cisco meraki_mx67w -
cisco meraki_mx68cw_firmware -
cisco meraki_mx68cw -
cisco meraki_mx68w_firmware -
cisco meraki_mx68w -
cisco meraki_z3_firmware -
cisco meraki_z3 -
cisco meraki_z3c_firmware -
cisco meraki_z3c -
cisco webex_board_55_firmware -
cisco webex_board_55 -
cisco webex_board_55s_firmware -
cisco webex_board_55s -
cisco webex_board_70_firmware -
cisco webex_board_70 -
cisco webex_board_70s_firmware -
cisco webex_board_70s -
cisco webex_board_85s_firmware -
cisco webex_board_85s -
cisco webex_dx70_firmware -
cisco webex_dx70 -
cisco webex_dx80_firmware -
cisco webex_dx80 -
cisco webex_room_55_firmware -
cisco webex_room_55 -
cisco webex_room_55_dual_firmware -
cisco webex_room_55_dual -
cisco webex_room_70_firmware -
cisco webex_room_70 -
cisco webex_room_70_dual_firmware -
cisco webex_room_70_dual -
cisco webex_room_70_dual_g2_firmware -
cisco webex_room_70_dual_g2 -
cisco webex_room_70_single_firmware -
cisco webex_room_70_single -
cisco webex_room_70_single_g2_firmware -
cisco webex_room_70_single_g2 -
cisco webex_room_kit_firmware -
cisco webex_room_kit -
cisco webex_room_kit_mini_firmware -
cisco webex_room_kit_mini -
intel ac_8260_firmware -
intel ac_8260 -
intel ac_8265_firmware -
intel ac_8265 -
intel ac_9260_firmware -
intel ac_9260 -
intel ac_9560_firmware -
intel ac_9560 -
intel killer_ac_1550_firmware -
intel killer_ac_1550 -
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel proset_ac_3165_firmware -
intel proset_ac_3165 -
intel proset_ac_3168_firmware -
intel proset_ac_3168 -
intel proset_ac_8260_firmware -
intel proset_ac_8260 -
intel proset_ac_8265_firmware -
intel proset_ac_8265 -
intel proset_ac_9260_firmware -
intel proset_ac_9260 -
intel proset_ac_9461_firmware -
intel proset_ac_9461 -
intel proset_ac_9462_firmware -
intel proset_ac_9462 -
intel proset_ac_9560_firmware -
intel proset_ac_9560 -
intel proset_wi-fi_6_ax200_firmware -
intel proset_wi-fi_6_ax200 -
intel proset_wi-fi_6_ax201_firmware -
intel proset_wi-fi_6_ax201 -
intel proset_wi-fi_6e_ax210_firmware -
intel proset_wi-fi_6e_ax210 -
intel proset_wireless_7265_\(rev_d\)_firmware -
intel proset_wireless_7265_\(rev_d\) -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *
linux linux_kernel *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
              "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*",
              "matchCriteriaId": "5F2558DF-2D1F-46BA-ABF1-08522D33268E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "68C08ECE-4D09-4E57-920B-B8E94E81603A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "F5154A83-2499-4756-9150-8BFD9ACEF583",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "7CC235C6-63B1-4085-B9AA-47EFB17A144D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*",
              "matchCriteriaId": "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*",
              "matchCriteriaId": "54C41A49-87FA-4C98-8321-2808712B2F68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "F8ED25D1-973F-481A-8550-16508F73D2D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "35918620-E4C5-4E46-A5A9-63009333667A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "27440732-54F0-40DF-9896-88D60ABC568A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "FC39A276-532B-428A-83BA-141B626281A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "93103556-6C4A-4D35-91D1-5CDCDC740655",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "5DEFC044-1D95-4386-AABB-ADE1099E3F85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "42759A0F-70C6-41DB-9DF9-2BC05685F678",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "95662406-0D7D-45B2-95F5-582FA275AC89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "A0E9FB66-F577-4744-B51F-3BD25293109F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "079DA749-0B94-4CCF-A3B1-7669DA213B52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "D96A05C3-1549-47DD-BADA-7872246EBDA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "2E7375AB-BE32-4879-BB54-CF5EDAB98188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "0E9E26B8-1539-4E21-AEAA-45095F79382A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "5AA05DFB-5C02-4822-8D32-406C11ABFFC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "0F01F2C2-E968-45EE-BA91-39AEEFC0345C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "19C73CA1-2F92-4635-8D38-812D6D8ACD89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "EA17907A-388A-42E7-ACC6-2F59C72C93F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "A53A71EB-C346-42CD-AD58-F83F809D0CA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "90E87633-CD6E-439B-9CE8-66A1E414F09D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "742D9262-4329-4F0A-B97E-5FC65786946F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "FC14C45F-FDFB-4AAC-94EC-45860051379F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "C01E79D8-5F48-4939-BFD6-B363A76769D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "CEE50FA1-6616-402A-9D86-9725206612C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "5B907930-CA5C-4160-A3D1-8ACB559C9143",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "9331282F-B426-40DC-869E-F6F7DFE959A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*",
              "matchCriteriaId": "C67D4B91-66EB-490E-B43D-A7E159CC543B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*",
              "matchCriteriaId": "45A6A314-804B-47DC-B35E-804AD89588D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "968D60A4-036A-4792-BE8E-88F8B26444DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "754B93BA-0451-4C09-A124-284A62189D53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "85293635-DD43-4651-8605-4F27F228AA91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "826FB2F4-45B5-4360-B577-11F75A1B67A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "F3417E19-D7FC-487D-B316-B826DB3CB712",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "B66B6DB7-E48C-4758-915E-E4096CC5D68E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "69C3A33C-85E1-4157-81F7-39FA271CF8ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "E65FB9EC-A750-44C9-B251-5D8697C29EC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7948D988-3ED9-49BE-B820-15728DA93D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B465A44-EC90-41C6-BD9B-59D3B7E49540",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA329302-48FE-43FB-A15D-C3BEFB5AE868",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "37055F7B-2F2A-4B80-AC34-CAB0568BC692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534CF2AE-2149-4599-AC43-13EE8048B3EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB15599-F795-4D24-A4A6-CD826F6A7A13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "441DF280-FC8C-481F-BDB9-7D757CF5BB72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF8A9161-738C-4730-8EC9-6A5C5FDE279D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BB9046-E47D-480A-93D2-DB0F76574E02",
              "versionEndExcluding": "4.4.271",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01BF34A-CD21-4B2F-9877-C89B8202B09A",
              "versionEndExcluding": "4.9.271",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "970E3D3C-8829-4599-95A7-AC63136CE48E",
              "versionEndExcluding": "4.14.235",
              "versionStartIncluding": "4.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC7D3563-5878-403A-9BB7-6C44E6FE10A0",
              "versionEndExcluding": "4.19.193",
              "versionStartIncluding": "4.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D49B11-5E8A-427F-B9BE-8A5174DEDD65",
              "versionEndExcluding": "5.4.124",
              "versionStartIncluding": "5.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3",
              "versionEndExcluding": "5.10.42",
              "versionStartIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903",
              "versionEndExcluding": "5.12.9",
              "versionStartIncluding": "5.12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets."
    },
    {
      "lang": "es",
      "value": "El est\u00e1ndar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que el flag A-MSDU en el campo de encabezado QoS de texto plano est\u00e9 autenticada. Contra dispositivos que admiten la recepci\u00f3n de tramas A-MSDU que no son SSP (que es obligatorio como parte de 802.11n), un adversario puede abusar de esto para inyectar paquetes de red arbitrarios"
    }
  ],
  "id": "CVE-2020-24588",
  "lastModified": "2024-11-21T05:15:05.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-11T20:15:08.613",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una Comprobaci\u00f3n Inapropiada del \u00cdndice, la Posici\u00f3n o el Desplazamiento Especificados en la Entrada en el firmware de algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0175",
  "lastModified": "2024-11-21T05:42:08.310",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.540",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una Comprobaci\u00f3n Inapropiada de la Consistencia dentro de la entrada en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0163",
  "lastModified": "2024-11-21T05:42:06.620",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.060",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:43
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66434F2B-0ED8-4364-9281-8A438B8D337D",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario privilegiado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local."
    }
  ],
  "id": "CVE-2022-21140",
  "lastModified": "2024-11-21T06:43:58.517",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.827",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:31
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio por medio de un acceso adyacente."
    }
  ],
  "id": "CVE-2021-44545",
  "lastModified": "2024-11-21T06:31:12.197",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.733",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:41
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware de algunos Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0072",
  "lastModified": "2024-11-21T05:41:47.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:10.943",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware para algunos Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0172",
  "lastModified": "2024-11-21T05:42:07.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.420",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una Comprobaci\u00f3n Inapropiada de la Consistencia dentro de la entrada en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0177",
  "lastModified": "2024-11-21T05:42:08.587",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.617",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una Comprobaci\u00f3n Inapropiada de la Consistencia dentro de la entrada en el firmware para algunos Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0173",
  "lastModified": "2024-11-21T05:42:08.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.460",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:03
Summary
Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "El cumplimiento insuficiente de las convenciones esperadas para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-32642",
  "lastModified": "2024-11-21T08:03:45.420",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:52.350",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1076"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 07:12
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
secure@intel.comhttp://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00043.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/Mailing List
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/Mailing List



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D000E1E-4DBE-47F1-B48F-577AFB0B9A3C",
              "versionEndExcluding": "34.22.1163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22B4543-24F8-4EF5-A2EE-2F35FFDE39B8",
              "versionEndExcluding": "22.200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EAFBED-37DE-4BAB-A498-DDE262F315F0",
              "versionEndExcluding": "3.2.20.23023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "575B6D56-BF5F-4D79-A3D4-253BC199B483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax203:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7B5478E-CE97-4514-A054-8BE1871623AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta en algunos programas Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2022-36351",
  "lastModified": "2024-11-21T07:12:50.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:12.807",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:06
Summary
Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access..



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access.."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-33875",
  "lastModified": "2024-11-21T08:06:07.170",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:56.020",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una inicializaci\u00f3n inapropiada de algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local."
    }
  ],
  "id": "CVE-2021-23223",
  "lastModified": "2024-11-21T05:51:24.070",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.273",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Una Exposici\u00f3n de Informaci\u00f3n Confidencial a un Actor no Autorizado en el firmware de algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio del acceso local"
    }
  ],
  "id": "CVE-2021-0170",
  "lastModified": "2024-11-21T05:42:07.620",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.343",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:54
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-28374",
  "lastModified": "2024-11-21T07:54:56.870",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:47.507",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0162",
  "lastModified": "2024-11-21T05:42:06.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.020",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2021-0178",
  "lastModified": "2024-11-21T05:42:08.730",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.657",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:57
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120 puede permitir a un usuario autenticado habilitar potencialmente la denegaci\u00f3n de servicio por acceso local."
    }
  ],
  "id": "CVE-2021-26950",
  "lastModified": "2024-11-21T05:57:06.300",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.410",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2021/05/11/12Mailing List, Third Party Advisory
cve@mitre.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdfPatch, Third Party Advisory
cve@mitre.orghttps://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.mdThird Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/06/msg00019.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/06/msg00020.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWuThird Party Advisory
cve@mitre.orghttps://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63Third Party Advisory
cve@mitre.orghttps://www.fragattacks.comThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/05/11/12Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdfPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.mdThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/06/msg00019.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/06/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWuThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.fragattacks.comThird Party Advisory
Impacted products
Vendor Product Version
netbsd netbsd 7.1
debian debian_linux 9.0
arista c-100_firmware -
arista c-100 -
arista c-110_firmware -
arista c-110 -
arista c-120_firmware -
arista c-120 -
arista c-130_firmware -
arista c-130 -
arista c-200_firmware -
arista c-200 -
arista c-230_firmware -
arista c-230 -
arista c-235_firmware -
arista c-235 -
arista c-250_firmware -
arista c-250 -
arista c-260_firmware -
arista c-260 -
arista c-65_firmware -
arista c-65 -
arista c-75_firmware -
arista c-75 -
arista o-105_firmware -
arista o-105 -
arista o-90_firmware -
arista o-90 -
arista w-118_firmware -
arista w-118 -
arista w-68_firmware -
arista w-68 -
cisco 1100_firmware -
cisco 1100 -
cisco 1100-4p_firmware -
cisco 1100-4p -
cisco 1100-8p_firmware -
cisco 1100-8p -
cisco 1101-4p_firmware -
cisco 1101-4p -
cisco 1109-2p_firmware -
cisco 1109-2p -
cisco 1109-4p_firmware -
cisco 1109-4p -
cisco aironet_1532_firmware -
cisco aironet_1532 -
cisco aironet_1542d_firmware -
cisco aironet_1542d -
cisco aironet_1542i_firmware -
cisco aironet_1542i -
cisco aironet_1552_firmware -
cisco aironet_1552 -
cisco aironet_1552h_firmware -
cisco aironet_1552h -
cisco aironet_1572_firmware -
cisco aironet_1572 -
cisco aironet_1702_firmware -
cisco aironet_1702 -
cisco aironet_1800_firmware -
cisco aironet_1800 -
cisco aironet_1800i_firmware -
cisco aironet_1800i -
cisco aironet_1810_firmware -
cisco aironet_1810 -
cisco aironet_1810w_firmware -
cisco aironet_1810w -
cisco aironet_1815_firmware -
cisco aironet_1815 -
cisco aironet_1815i_firmware -
cisco aironet_1815i -
cisco aironet_1832_firmware -
cisco aironet_1832 -
cisco aironet_1842_firmware -
cisco aironet_1842 -
cisco aironet_1852_firmware -
cisco aironet_1852 -
cisco aironet_2702_firmware -
cisco aironet_2702 -
cisco aironet_2800_firmware -
cisco aironet_2800 -
cisco aironet_2800e_firmware -
cisco aironet_2800e -
cisco aironet_2800i_firmware -
cisco aironet_2800i -
cisco aironet_3702_firmware -
cisco aironet_3702 -
cisco aironet_3800_firmware -
cisco aironet_3800 -
cisco aironet_3800e_firmware -
cisco aironet_3800e -
cisco aironet_3800i_firmware -
cisco aironet_3800i -
cisco aironet_3800p_firmware -
cisco aironet_3800p -
cisco aironet_4800_firmware -
cisco aironet_4800 -
cisco aironet_ap803_firmware -
cisco aironet_ap803 -
cisco aironet_iw3702_firmware -
cisco aironet_iw3702 -
cisco catalyst_9105_firmware -
cisco catalyst_9105 -
cisco catalyst_9105axi_firmware -
cisco catalyst_9105axi -
cisco catalyst_9105axw_firmware -
cisco catalyst_9105axw -
cisco catalyst_9115_firmware -
cisco catalyst_9115 -
cisco catalyst_9115_ap_firmware -
cisco catalyst_9115_ap -
cisco catalyst_9115axe_firmware -
cisco catalyst_9115axe -
cisco catalyst_9115axi_firmware -
cisco catalyst_9115axi -
cisco catalyst_9117_firmware -
cisco catalyst_9117 -
cisco catalyst_9117_ap_firmware -
cisco catalyst_9117_ap -
cisco catalyst_9117axi_firmware -
cisco catalyst_9117axi -
cisco catalyst_9120_firmware -
cisco catalyst_9120 -
cisco catalyst_9120_ap_firmware -
cisco catalyst_9120_ap -
cisco catalyst_9120axe_firmware -
cisco catalyst_9120axe -
cisco catalyst_9120axi_firmware -
cisco catalyst_9120axi -
cisco catalyst_9120axp_firmware -
cisco catalyst_9120axp -
cisco catalyst_9124_firmware -
cisco catalyst_9124 -
cisco catalyst_9124axd_firmware -
cisco catalyst_9124axd -
cisco catalyst_9124axi_firmware -
cisco catalyst_9124axi -
cisco catalyst_9130_firmware -
cisco catalyst_9130 -
cisco catalyst_9130_ap_firmware -
cisco catalyst_9130_ap -
cisco catalyst_9130axe_firmware -
cisco catalyst_9130axe -
cisco catalyst_9130axi_firmware -
cisco catalyst_9130axi -
cisco catalyst_iw6300_firmware -
cisco catalyst_iw6300 -
cisco catalyst_iw6300_ac_firmware -
cisco catalyst_iw6300_ac -
cisco catalyst_iw6300_dc_firmware -
cisco catalyst_iw6300_dc -
cisco catalyst_iw6300_dcw_firmware -
cisco catalyst_iw6300_dcw -
cisco esw6300_firmware -
cisco esw6300 -
cisco ip_phone_6861_firmware -
cisco ip_phone_6861 -
cisco ip_phone_8821_firmware -
cisco ip_phone_8821 -
cisco ip_phone_8832_firmware -
cisco ip_phone_8832 -
cisco ip_phone_8861_firmware -
cisco ip_phone_8861 -
cisco ip_phone_8865_firmware -
cisco ip_phone_8865 -
cisco ir829-2lte-ea-ak9_firmware -
cisco ir829-2lte-ea-ak9 -
cisco ir829-2lte-ea-bk9_firmware -
cisco ir829-2lte-ea-bk9 -
cisco ir829-2lte-ea-ek9_firmware -
cisco ir829-2lte-ea-ek9 -
cisco ir829gw-lte-ga-ck9_firmware -
cisco ir829gw-lte-ga-ck9 -
cisco ir829gw-lte-ga-ek9_firmware -
cisco ir829gw-lte-ga-ek9 -
cisco ir829gw-lte-ga-sk9_firmware -
cisco ir829gw-lte-ga-sk9 -
cisco ir829gw-lte-ga-zk9_firmware -
cisco ir829gw-lte-ga-zk9 -
cisco ir829gw-lte-na-ak9_firmware -
cisco ir829gw-lte-na-ak9 -
cisco ir829gw-lte-vz-ak9_firmware -
cisco ir829gw-lte-vz-ak9 -
cisco meraki_gr10_firmware -
cisco meraki_gr10 -
cisco meraki_gr60_firmware -
cisco meraki_gr60 -
cisco meraki_mr12_firmware -
cisco meraki_mr12 -
cisco meraki_mr20_firmware -
cisco meraki_mr20 -
cisco meraki_mr26_firmware -
cisco meraki_mr26 -
cisco meraki_mr30h_firmware -
cisco meraki_mr30h -
cisco meraki_mr32_firmware -
cisco meraki_mr32 -
cisco meraki_mr33_firmware -
cisco meraki_mr33 -
cisco meraki_mr34_firmware -
cisco meraki_mr34 -
cisco meraki_mr36_firmware -
cisco meraki_mr36 -
cisco meraki_mr42_firmware -
cisco meraki_mr42 -
cisco meraki_mr42e_firmware -
cisco meraki_mr42e -
cisco meraki_mr44_firmware -
cisco meraki_mr44 -
cisco meraki_mr45_firmware -
cisco meraki_mr45 -
cisco meraki_mr46_firmware -
cisco meraki_mr46 -
cisco meraki_mr46e_firmware -
cisco meraki_mr46e -
cisco meraki_mr52_firmware -
cisco meraki_mr52 -
cisco meraki_mr53_firmware -
cisco meraki_mr53 -
cisco meraki_mr53e_firmware -
cisco meraki_mr53e -
cisco meraki_mr55_firmware -
cisco meraki_mr55 -
cisco meraki_mr56_firmware -
cisco meraki_mr56 -
cisco meraki_mr62_firmware -
cisco meraki_mr62 -
cisco meraki_mr66_firmware -
cisco meraki_mr66 -
cisco meraki_mr70_firmware -
cisco meraki_mr70 -
cisco meraki_mr72_firmware -
cisco meraki_mr72 -
cisco meraki_mr74_firmware -
cisco meraki_mr74 -
cisco meraki_mr76_firmware -
cisco meraki_mr76 -
cisco meraki_mr84_firmware -
cisco meraki_mr84 -
cisco meraki_mr86_firmware -
cisco meraki_mr86 -
cisco meraki_mx64w_firmware -
cisco meraki_mx64w -
cisco meraki_mx65w_firmware -
cisco meraki_mx65w -
cisco meraki_mx67cw_firmware -
cisco meraki_mx67cw -
cisco meraki_mx67w_firmware -
cisco meraki_mx67w -
cisco meraki_mx68cw_firmware -
cisco meraki_mx68cw -
cisco meraki_mx68w_firmware -
cisco meraki_mx68w -
cisco meraki_z3_firmware -
cisco meraki_z3 -
cisco meraki_z3c_firmware -
cisco meraki_z3c -
cisco webex_board_55_firmware -
cisco webex_board_55 -
cisco webex_board_55s_firmware -
cisco webex_board_55s -
cisco webex_board_70_firmware -
cisco webex_board_70 -
cisco webex_board_70s_firmware -
cisco webex_board_70s -
cisco webex_board_85s_firmware -
cisco webex_board_85s -
cisco webex_dx70_firmware -
cisco webex_dx70 -
cisco webex_dx80_firmware -
cisco webex_dx80 -
cisco webex_room_55_firmware -
cisco webex_room_55 -
cisco webex_room_55_dual_firmware -
cisco webex_room_55_dual -
cisco webex_room_70_firmware -
cisco webex_room_70 -
cisco webex_room_70_dual_firmware -
cisco webex_room_70_dual -
cisco webex_room_70_dual_g2_firmware -
cisco webex_room_70_dual_g2 -
cisco webex_room_70_single_firmware -
cisco webex_room_70_single -
cisco webex_room_70_single_g2_firmware -
cisco webex_room_70_single_g2 -
cisco webex_room_kit_firmware -
cisco webex_room_kit -
cisco webex_room_kit_mini_firmware -
cisco webex_room_kit_mini -
intel ac_8260_firmware -
intel ac_8260 -
intel ac_8265_firmware -
intel ac_8265 -
intel ac_9260_firmware -
intel ac_9260 -
intel ac_9560_firmware -
intel ac_9560 -
intel killer_ac_1550_firmware -
intel killer_ac_1550 -
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel proset_ac_3165_firmware -
intel proset_ac_3165 -
intel proset_ac_3168_firmware -
intel proset_ac_3168 -
intel proset_ac_8260_firmware -
intel proset_ac_8260 -
intel proset_ac_8265_firmware -
intel proset_ac_8265 -
intel proset_ac_9260_firmware -
intel proset_ac_9260 -
intel proset_ac_9461_firmware -
intel proset_ac_9461 -
intel proset_ac_9462_firmware -
intel proset_ac_9462 -
intel proset_ac_9560_firmware -
intel proset_ac_9560 -
intel proset_wi-fi_6_ax200_firmware -
intel proset_wi-fi_6_ax200 -
intel proset_wi-fi_6_ax201_firmware -
intel proset_wi-fi_6_ax201 -
intel proset_wi-fi_6e_ax210_firmware -
intel proset_wi-fi_6e_ax210 -
intel proset_wireless_7265_\(rev_d\)_firmware -
intel proset_wireless_7265_\(rev_d\) -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A99D021-C66D-4FA2-B33C-4DAADBB6B431",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en el kernel en NetBSD versi\u00f3n 7.1. Un punto de acceso (AP) reenv\u00eda tramas EAPOL a otros clientes aunque el remitente a\u00fan no se haya autenticado con \u00e9xito en el AP. Esto podr\u00eda ser abusado en redes Wi-Fi proyectadas para lanzar ataques de denegaci\u00f3n de servicio contra clientes conectados y facilitar la explotaci\u00f3n de otras vulnerabilidades en clientes conectados"
    }
  ],
  "id": "CVE-2020-26139",
  "lastModified": "2024-11-21T05:19:20.157",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-11T20:15:08.647",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:41
Summary
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n Inapropiada del \u00cdndice, la Posici\u00f3n o el Desplazamiento Especificados en la Entrada en el firmware para algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0076",
  "lastModified": "2024-11-21T05:41:48.217",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:10.980",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0167",
  "lastModified": "2024-11-21T05:42:07.220",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.223",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:03
Summary
Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La falla del mecanismo de protecci\u00f3n para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-32644",
  "lastModified": "2024-11-21T08:03:45.713",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:53.043",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-693"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Use of Validation Framework in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Use of Validation Framework in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un uso Inapropiado del Marco de Comprobaci\u00f3n en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0179",
  "lastModified": "2024-11-21T05:42:08.873",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.693",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:09
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, pueden permitir que un usuario autenticado habilite potencialmente una escalada de privilegios por medio del acceso local."
    }
  ],
  "id": "CVE-2021-33847",
  "lastModified": "2024-11-21T06:09:41.313",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.587",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un Elemento de Ruta de B\u00fasqueda no Controlado en el software para Intel(R) PROSet/Wireless Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0169",
  "lastModified": "2024-11-21T05:42:07.483",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.300",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una Exposici\u00f3n de Informaci\u00f3n Confidencial a un Actor no Autorizado en el firmware de algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio del acceso local"
    }
  ],
  "id": "CVE-2021-0166",
  "lastModified": "2024-11-21T05:42:07.087",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.183",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:55
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, pueden permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio por acceso local."
    }
  ],
  "id": "CVE-2021-26257",
  "lastModified": "2024-11-21T05:55:59.567",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.367",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware de algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0176",
  "lastModified": "2024-11-21T05:42:08.450",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.577",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Impacted products
Vendor Product Version
alfa awus036h_firmware 6.1316.1209
alfa awus036h -
siemens scalance_w1748-1_firmware -
siemens scalance_w1748-1 -
siemens scalance_w1750d_firmware -
siemens scalance_w1750d -
siemens scalance_w1788-1_firmware -
siemens scalance_w1788-1 -
siemens scalance_w1788-2_firmware -
siemens scalance_w1788-2 -
siemens scalance_w1788-2_firmware -
siemens scalance_w1788-2 -
siemens scalance_w1788-2ia_firmware -
siemens scalance_w1788-2ia -
siemens scalance_w721-1_firmware -
siemens scalance_w721-1 -
siemens scalance_w722-1_firmware -
siemens scalance_w722-1 -
siemens scalance_w734-1_firmware -
siemens scalance_w734-1 -
siemens scalance_w738-1_firmware -
siemens scalance_w738-1 -
siemens scalance_w748-1_firmware -
siemens scalance_w748-1 -
siemens scalance_w748-1_firmware -
siemens scalance_w748-1 -
siemens scalance_w761-1_firmware -
siemens scalance_w761-1 -
siemens scalance_w774-1_firmware -
siemens scalance_w774-1 -
siemens scalance_w774-1_firmware -
siemens scalance_w774-1 -
siemens scalance_w778-1_firmware -
siemens scalance_w778-1 -
siemens scalance_w778-1_firmware -
siemens scalance_w778-1 -
siemens scalance_w786-1_firmware -
siemens scalance_w786-1 -
siemens scalance_w786-2_firmware -
siemens scalance_w786-2 -
siemens scalance_w786-2_firmware -
siemens scalance_w786-2 -
siemens scalance_w786-2ia_firmware -
siemens scalance_w786-2ia -
siemens scalance_w788-1_firmware -
siemens scalance_w788-1 -
siemens scalance_w788-1_firmware -
siemens scalance_w788-1 -
siemens scalance_w788-2_firmware -
siemens scalance_w788-2 -
siemens scalance_w788-2_firmware -
siemens scalance_w788-2 -
siemens scalance_w788-2_firmware -
siemens scalance_w788-2 -
siemens scalance_wam763-1_firmware -
siemens scalance_wam763-1 -
siemens scalance_wam766-1_firmware -
siemens scalance_wam766-1 -
siemens scalance_wam766-1_firmware -
siemens scalance_wam766-1 -
siemens scalance_wam766-1_6ghz_firmware -
siemens scalance_wam766-1_6ghz -
siemens scalance_wam766-1_6ghz_firmware -
siemens scalance_wam766-1_6ghz -
siemens scalance_wum763-1_firmware -
siemens scalance_wum763-1 -
siemens scalance_wum766-1_firmware -
siemens scalance_wum766-1 -
siemens scalance_wum766-1_6ghz_firmware -
siemens scalance_wum766-1_6ghz -
arista c-100_firmware -
arista c-100 -
arista c-110_firmware -
arista c-110 -
arista c-120_firmware -
arista c-120 -
arista c-130_firmware -
arista c-130 -
arista c-200_firmware -
arista c-200 -
arista c-230_firmware -
arista c-230 -
arista c-235_firmware -
arista c-235 -
arista c-250_firmware -
arista c-250 -
arista c-260_firmware -
arista c-260 -
arista c-65_firmware -
arista c-65 -
arista c-75_firmware -
arista c-75 -
arista o-105_firmware -
arista o-105 -
arista o-90_firmware -
arista o-90 -
arista w-118_firmware -
arista w-118 -
arista w-68_firmware -
arista w-68 -
cisco 1100_firmware -
cisco 1100 -
cisco 1100-4p_firmware -
cisco 1100-4p -
cisco 1100-8p_firmware -
cisco 1100-8p -
cisco 1101-4p_firmware -
cisco 1101-4p -
cisco 1109-2p_firmware -
cisco 1109-2p -
cisco 1109-4p_firmware -
cisco 1109-4p -
cisco aironet_1532_firmware -
cisco aironet_1532 -
cisco aironet_1542d_firmware -
cisco aironet_1542d -
cisco aironet_1542i_firmware -
cisco aironet_1542i -
cisco aironet_1552_firmware -
cisco aironet_1552 -
cisco aironet_1552h_firmware -
cisco aironet_1552h -
cisco aironet_1560_firmware -
cisco aironet_1560 -
cisco aironet_1562d_firmware -
cisco aironet_1562d -
cisco aironet_1562e_firmware -
cisco aironet_1562e -
cisco aironet_1562i_firmware -
cisco aironet_1562i -
cisco aironet_1572_firmware -
cisco aironet_1572 -
cisco aironet_1702_firmware -
cisco aironet_1702 -
cisco aironet_1800_firmware -
cisco aironet_1800 -
cisco aironet_1800i_firmware -
cisco aironet_1800i -
cisco aironet_1810_firmware -
cisco aironet_1810 -
cisco aironet_1810w_firmware -
cisco aironet_1810w -
cisco aironet_1815_firmware -
cisco aironet_1815 -
cisco aironet_1815i_firmware -
cisco aironet_1815i -
cisco aironet_1832_firmware -
cisco aironet_1832 -
cisco aironet_1842_firmware -
cisco aironet_1842 -
cisco aironet_1852_firmware -
cisco aironet_1852 -
cisco aironet_2702_firmware -
cisco aironet_2702 -
cisco aironet_2800_firmware -
cisco aironet_2800 -
cisco aironet_2800e_firmware -
cisco aironet_2800e -
cisco aironet_2800i_firmware -
cisco aironet_2800i -
cisco aironet_3702_firmware -
cisco aironet_3702 -
cisco aironet_3800_firmware -
cisco aironet_3800 -
cisco aironet_3800e_firmware -
cisco aironet_3800e -
cisco aironet_3800i_firmware -
cisco aironet_3800i -
cisco aironet_3800p_firmware -
cisco aironet_3800p -
cisco aironet_4800_firmware -
cisco aironet_4800 -
cisco aironet_ap803_firmware -
cisco aironet_ap803 -
cisco aironet_iw3702_firmware -
cisco aironet_iw3702 -
cisco catalyst_9105_firmware -
cisco catalyst_9105 -
cisco catalyst_9105axi_firmware -
cisco catalyst_9105axi -
cisco catalyst_9105axw_firmware -
cisco catalyst_9105axw -
cisco catalyst_9115_firmware -
cisco catalyst_9115 -
cisco catalyst_9115_ap_firmware -
cisco catalyst_9115_ap -
cisco catalyst_9115axe_firmware -
cisco catalyst_9115axe -
cisco catalyst_9115axi_firmware -
cisco catalyst_9115axi -
cisco catalyst_9117_firmware -
cisco catalyst_9117 -
cisco catalyst_9117_ap_firmware -
cisco catalyst_9117_ap -
cisco catalyst_9117axi_firmware -
cisco catalyst_9117axi -
cisco catalyst_9120_firmware -
cisco catalyst_9120 -
cisco catalyst_9120_ap_firmware -
cisco catalyst_9120_ap -
cisco catalyst_9120axe_firmware -
cisco catalyst_9120axe -
cisco catalyst_9120axi_firmware -
cisco catalyst_9120axi -
cisco catalyst_9120axp_firmware -
cisco catalyst_9120axp -
cisco catalyst_9124_firmware -
cisco catalyst_9124 -
cisco catalyst_9124axd_firmware -
cisco catalyst_9124axd -
cisco catalyst_9124axi_firmware -
cisco catalyst_9124axi -
cisco catalyst_9130_firmware -
cisco catalyst_9130 -
cisco catalyst_9130_ap_firmware -
cisco catalyst_9130_ap -
cisco catalyst_9130axe_firmware -
cisco catalyst_9130axe -
cisco catalyst_9130axi_firmware -
cisco catalyst_9130axi -
cisco catalyst_iw6300_firmware -
cisco catalyst_iw6300 -
cisco catalyst_iw6300_ac_firmware -
cisco catalyst_iw6300_ac -
cisco catalyst_iw6300_dc_firmware -
cisco catalyst_iw6300_dc -
cisco catalyst_iw6300_dcw_firmware -
cisco catalyst_iw6300_dcw -
cisco esw-6300-con-x-k9_firmware -
cisco esw-6300-con-x-k9 -
cisco esw6300_firmware -
cisco esw6300 -
cisco ip_phone_6861_firmware -
cisco ip_phone_6861 -
cisco ip_phone_8821_firmware -
cisco ip_phone_8821 -
cisco ip_phone_8832_firmware -
cisco ip_phone_8832 -
cisco ip_phone_8861_firmware -
cisco ip_phone_8861 -
cisco ip_phone_8865_firmware -
cisco ip_phone_8865 -
cisco ir829-2lte-ea-ak9_firmware -
cisco ir829-2lte-ea-ak9 -
cisco ir829-2lte-ea-bk9_firmware -
cisco ir829-2lte-ea-bk9 -
cisco ir829-2lte-ea-ek9_firmware -
cisco ir829-2lte-ea-ek9 -
cisco ir829gw-lte-ga-ck9_firmware -
cisco ir829gw-lte-ga-ck9 -
cisco ir829gw-lte-ga-ek9_firmware -
cisco ir829gw-lte-ga-ek9 -
cisco ir829gw-lte-ga-sk9_firmware -
cisco ir829gw-lte-ga-sk9 -
cisco ir829gw-lte-ga-zk9_firmware -
cisco ir829gw-lte-ga-zk9 -
cisco ir829gw-lte-na-ak9_firmware -
cisco ir829gw-lte-na-ak9 -
cisco ir829gw-lte-vz-ak9_firmware -
cisco ir829gw-lte-vz-ak9 -
cisco meraki_gr10_firmware -
cisco meraki_gr10 -
cisco meraki_gr60_firmware -
cisco meraki_gr60 -
cisco meraki_mr12_firmware -
cisco meraki_mr12 -
cisco meraki_mr20_firmware -
cisco meraki_mr20 -
cisco meraki_mr26_firmware -
cisco meraki_mr26 -
cisco meraki_mr30h_firmware -
cisco meraki_mr30h -
cisco meraki_mr32_firmware -
cisco meraki_mr32 -
cisco meraki_mr33_firmware -
cisco meraki_mr33 -
cisco meraki_mr34_firmware -
cisco meraki_mr34 -
cisco meraki_mr36_firmware -
cisco meraki_mr36 -
cisco meraki_mr42_firmware -
cisco meraki_mr42 -
cisco meraki_mr42e_firmware -
cisco meraki_mr42e -
cisco meraki_mr44_firmware -
cisco meraki_mr44 -
cisco meraki_mr45_firmware -
cisco meraki_mr45 -
cisco meraki_mr46_firmware -
cisco meraki_mr46 -
cisco meraki_mr46e_firmware -
cisco meraki_mr46e -
cisco meraki_mr52_firmware -
cisco meraki_mr52 -
cisco meraki_mr53_firmware -
cisco meraki_mr53 -
cisco meraki_mr53e_firmware -
cisco meraki_mr53e -
cisco meraki_mr55_firmware -
cisco meraki_mr55 -
cisco meraki_mr56_firmware -
cisco meraki_mr56 -
cisco meraki_mr62_firmware -
cisco meraki_mr62 -
cisco meraki_mr66_firmware -
cisco meraki_mr66 -
cisco meraki_mr70_firmware -
cisco meraki_mr70 -
cisco meraki_mr72_firmware -
cisco meraki_mr72 -
cisco meraki_mr74_firmware -
cisco meraki_mr74 -
cisco meraki_mr76_firmware -
cisco meraki_mr76 -
cisco meraki_mr84_firmware -
cisco meraki_mr84 -
cisco meraki_mr86_firmware -
cisco meraki_mr86 -
cisco meraki_mx64w_firmware -
cisco meraki_mx64w -
cisco meraki_mx65w_firmware -
cisco meraki_mx65w -
cisco meraki_mx67cw_firmware -
cisco meraki_mx67cw -
cisco meraki_mx67w_firmware -
cisco meraki_mx67w -
cisco meraki_mx68cw_firmware -
cisco meraki_mx68cw -
cisco meraki_mx68w_firmware -
cisco meraki_mx68w -
cisco meraki_z3_firmware -
cisco meraki_z3 -
cisco meraki_z3c_firmware -
cisco meraki_z3c -
cisco webex_board_55_firmware -
cisco webex_board_55 -
cisco webex_board_55s_firmware -
cisco webex_board_55s -
cisco webex_board_70_firmware -
cisco webex_board_70 -
cisco webex_board_70s_firmware -
cisco webex_board_70s -
cisco webex_board_85s_firmware -
cisco webex_board_85s -
cisco webex_dx70_firmware -
cisco webex_dx70 -
cisco webex_dx80_firmware -
cisco webex_dx80 -
cisco webex_room_55_firmware -
cisco webex_room_55 -
cisco webex_room_55_dual_firmware -
cisco webex_room_55_dual -
cisco webex_room_70_firmware -
cisco webex_room_70 -
cisco webex_room_70_dual_firmware -
cisco webex_room_70_dual -
cisco webex_room_70_dual_g2_firmware -
cisco webex_room_70_dual_g2 -
cisco webex_room_70_single_firmware -
cisco webex_room_70_single -
cisco webex_room_70_single_g2_firmware -
cisco webex_room_70_single_g2 -
cisco webex_room_kit_firmware -
cisco webex_room_kit -
cisco webex_room_kit_mini_firmware -
cisco webex_room_kit_mini -
intel ac_8260_firmware -
intel ac_8260 -
intel ac_8265_firmware -
intel ac_8265 -
intel ac_9260_firmware -
intel ac_9260 -
intel ac_9560_firmware -
intel ac_9560 -
intel killer_ac_1550_firmware -
intel killer_ac_1550 -
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel proset_ac_3165_firmware -
intel proset_ac_3165 -
intel proset_ac_3168_firmware -
intel proset_ac_3168 -
intel proset_ac_8260_firmware -
intel proset_ac_8260 -
intel proset_ac_8265_firmware -
intel proset_ac_8265 -
intel proset_ac_9260_firmware -
intel proset_ac_9260 -
intel proset_ac_9461_firmware -
intel proset_ac_9461 -
intel proset_ac_9462_firmware -
intel proset_ac_9462 -
intel proset_ac_9560_firmware -
intel proset_ac_9560 -
intel proset_wi-fi_6_ax200_firmware -
intel proset_wi-fi_6_ax200 -
intel proset_wi-fi_6_ax201_firmware -
intel proset_wi-fi_6_ax201 -
intel proset_wi-fi_6e_ax210_firmware -
intel proset_wi-fi_6e_ax210 -
intel proset_wireless_7265_\(rev_d\)_firmware -
intel proset_wireless_7265_\(rev_d\) -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*",
              "matchCriteriaId": "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0F9200-8AFD-4100-AF39-49476298C0E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "68C08ECE-4D09-4E57-920B-B8E94E81603A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "F5154A83-2499-4756-9150-8BFD9ACEF583",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "7CC235C6-63B1-4085-B9AA-47EFB17A144D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*",
              "matchCriteriaId": "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*",
              "matchCriteriaId": "54C41A49-87FA-4C98-8321-2808712B2F68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "F8ED25D1-973F-481A-8550-16508F73D2D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "35918620-E4C5-4E46-A5A9-63009333667A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "27440732-54F0-40DF-9896-88D60ABC568A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "FC39A276-532B-428A-83BA-141B626281A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "93103556-6C4A-4D35-91D1-5CDCDC740655",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "5DEFC044-1D95-4386-AABB-ADE1099E3F85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "42759A0F-70C6-41DB-9DF9-2BC05685F678",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "95662406-0D7D-45B2-95F5-582FA275AC89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "A0E9FB66-F577-4744-B51F-3BD25293109F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "079DA749-0B94-4CCF-A3B1-7669DA213B52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "D96A05C3-1549-47DD-BADA-7872246EBDA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "2E7375AB-BE32-4879-BB54-CF5EDAB98188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "0E9E26B8-1539-4E21-AEAA-45095F79382A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "5AA05DFB-5C02-4822-8D32-406C11ABFFC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "0F01F2C2-E968-45EE-BA91-39AEEFC0345C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "19C73CA1-2F92-4635-8D38-812D6D8ACD89",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "EA17907A-388A-42E7-ACC6-2F59C72C93F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "A53A71EB-C346-42CD-AD58-F83F809D0CA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "90E87633-CD6E-439B-9CE8-66A1E414F09D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "742D9262-4329-4F0A-B97E-5FC65786946F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "FC14C45F-FDFB-4AAC-94EC-45860051379F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "C01E79D8-5F48-4939-BFD6-B363A76769D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "CEE50FA1-6616-402A-9D86-9725206612C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "5B907930-CA5C-4160-A3D1-8ACB559C9143",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "9331282F-B426-40DC-869E-F6F7DFE959A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*",
              "matchCriteriaId": "C67D4B91-66EB-490E-B43D-A7E159CC543B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*",
              "matchCriteriaId": "45A6A314-804B-47DC-B35E-804AD89588D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "968D60A4-036A-4792-BE8E-88F8B26444DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "754B93BA-0451-4C09-A124-284A62189D53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "85293635-DD43-4651-8605-4F27F228AA91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "826FB2F4-45B5-4360-B577-11F75A1B67A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "F3417E19-D7FC-487D-B316-B826DB3CB712",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*",
              "matchCriteriaId": "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "B66B6DB7-E48C-4758-915E-E4096CC5D68E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*",
              "matchCriteriaId": "69C3A33C-85E1-4157-81F7-39FA271CF8ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "E65FB9EC-A750-44C9-B251-5D8697C29EC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*",
              "matchCriteriaId": "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7948D988-3ED9-49BE-B820-15728DA93D21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B465A44-EC90-41C6-BD9B-59D3B7E49540",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA329302-48FE-43FB-A15D-C3BEFB5AE868",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*",
              "matchCriteriaId": "37055F7B-2F2A-4B80-AC34-CAB0568BC692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534CF2AE-2149-4599-AC43-13EE8048B3EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB15599-F795-4D24-A4A6-CD826F6A7A13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "441DF280-FC8C-481F-BDB9-7D757CF5BB72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF8A9161-738C-4730-8EC9-6A5C5FDE279D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11CE6C04-4994-463F-A456-1D47F2BD793A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4E82587-A7A1-4057-896A-F30B9DF7C831",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89F2DFE1-6E7B-42CC-9814-90F426D14490",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8197BD27-2AD7-434C-8F64-24B3D6D6E188",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C15C55-207E-4030-AC2A-B2E3791D92B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB011F08-5526-4D49-8100-A874CD265FB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F81C550-CE6F-4E68-A088-5EC0CEF40600",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29B18F4E-4968-493A-BC90-5D8D7F619F39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54878C0D-8842-490F-B556-76AF47A65891",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A71084-E505-4648-9B5C-C0305DCE91AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE97F0AD-8658-476A-8E22-DA67A5FD9F73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A09137-CF46-420E-9792-BB6E46C5C415",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A006A8BD-D56E-40C2-ADD2-C11759153808",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C890ABE-5D64-4D7F-A67B-BC026649E0B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B617EA3-E69E-43CA-99D4-86A408C55C90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF499EE6-0047-42C0-8360-6A2B3DF51B1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9860B5-6CC7-4F29-9514-A469AF6B28F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9D810C-AA04-4748-80EB-3FB5DE507F89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7999A6-03FE-4C38-9C46-B3221E7B3815",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC042678-29AA-44F7-BBF0-1D752D25687D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81634E2A-FAD5-4B1C-A93E-545870615343",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA8D5057-138A-42C4-BA35-8077A0A60068",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED555B12-41F4-4D62-B519-22601FB7AF8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B10158-5235-483E-BACD-C407609EA6BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17C8544-CB4E-407B-BE52-4D42D81BF1BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8964F9BA-6E6C-44BF-9A8C-93D081B6678C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA214FF2-358E-4291-B803-58A9AC14ABEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51251FE1-67D2-4903-B7D3-E0C727B9A93C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31FB34B4-235B-4C92-8E9C-DD04136C745F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2051CA5B-967D-4830-87EB-1756559C1FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DB7510-2741-464A-8FC9-8419985E330F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72EC048-B84B-4744-BC04-BA8612C79D04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE916B2-CAAD-4508-A47E-A7D4D88B077A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5DD78C-B89C-44AF-B153-033FEDE22CF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54636F7-8061-49A1-923B-F976491593CB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D795375C-E17C-4E05-8C88-F080C22652B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6EF369-8D83-4F5D-BDBE-99E89AD84810",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8191FD87-4E55-4F38-8DB0-7E6772AD075B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10BD5327-F3F8-4D0A-B6DC-2F11DF2E6866",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D717945-EE41-4D0F-86EF-90826EBE9C3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "893D104F-6711-46F9-804C-4B57562166E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EAEA92-6589-4DFB-BC4B-8CBA425452D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AABCC2-D2A5-4A89-9DF9-6F80EB871CC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27AB201-342D-4517-9E05-6088598F4695",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53106CD6-749D-4781-B28E-E075E61D1196",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25445A6-4B1E-4F77-804D-FFD9507B022A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BDAFC3-940F-40C4-896E-99B6DABA9E3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FC7CCB-52D2-4B4D-82AA-759C80E17018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC836B4D-A489-4300-B0A2-EF0B6E01E623",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB94F02B-C71A-4EAE-B931-30CFA52A890C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF011423-521A-41C4-A403-FF82C2C14874",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E076DDF4-6817-4CFD-B4A3-243D8D755DE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BF9DDB-884D-47B5-A295-8BFA5207C412",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "205E19BF-078D-475D-A9F0-4A1604A2D554",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A15C8E-73D8-480D-B5C9-E72E8D4695D0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "751469E2-91A8-48F1-81A8-AEBF1420EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFAEDA4F-C728-4D60-8661-90429A264E40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18035D1A-C8D9-4055-A5CA-541711DBA71A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80871D9C-43D5-4507-AC36-CDD7CC4A7C86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CC13255-92FB-4585-B6EF-E4D94EB6158D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A796152-A567-4B7A-8202-94858CD95119",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED80079E-2744-4325-86DA-EA3647B45179",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B836136-CCD2-49AC-9871-1C3B6255EDA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFE3575-DDAF-433E-8D77-4CCADADC99B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD51123-ECF1-4042-AE1C-724FF4C51F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C47517-5F78-4D3C-818E-6DBFD1B56592",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F103B67B-89C9-465D-AF2E-3D24A8F5465D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5618CE7C-DF82-4849-AC79-A00B747883BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F38C35-EFC2-4CF9-AD88-FADC42F0649D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5062B18F-F28C-4975-A5A3-45C0EC03F448",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "338A22C8-5617-45C8-AB3E-5E45341DFE60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6214A82C-54A6-48FC-9714-742704BEF1D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68410865-70F5-4578-99E4-827DBE0207B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FF827E8-02BE-42C0-A0CE-B649601847E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEB7E5B-AE32-455A-A351-368FB78E5276",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE86352-EEDB-4890-87B8-025EA970219B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3DCF4E-081A-4375-A4A0-AAAD8F024114",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C11A3E-E431-4923-AEBA-25E3247F19C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E48E571-AE00-47E2-BABC-849A63DBDCF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8A6B51-5192-4B98-9D94-682290890074",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07AB0E3-151D-4D80-A482-41E7A27AE068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A99728C-9E6B-4249-BAAA-C080109EFC4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C73A651-932E-43CA-B40F-2F75510AEE36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A71D9CA-91DF-48DD-AE3D-DED883666A75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF43EC0A-AC28-408A-8375-11CE249217A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA19FD7-047B-43AA-9237-807AAA2E9F7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D85A86-1D8B-4006-8BF7-4593B1D7EB70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D74EA-8820-4C78-B43B-FCBC9779FCB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C380AE-C888-4AED-80D2-B9AF5EB9EC85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AA48001-7F56-4155-B70D-5DC41D73DB38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB09D94E-A6B2-496D-87A3-53CB9872FA69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23153AA4-B169-4421-BFF8-873205FC9C21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3E846C-359B-4EF1-AD68-DE612C5697F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67DC3B71-B64D-4C49-B089-B274FA34ECB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFE9F2D-407B-49CE-BB6C-80DC941A9371",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F857465-314F-4124-9835-8A269486D654",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw-6300-con-x-k9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90A743E4-1302-4DAB-9300-65D8F468C8F2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3625BC-9003-4E07-B4EA-EB44CADDD6B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05A7CA6-AD58-45D7-AF32-129E22855D8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C99E0B-0383-4CB3-B325-EC0F3D57D39D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2CDAD5D-3702-42EE-AE5A-A08842870EEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "090EE553-01D5-45F0-87A4-E1167F46EB77",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB907B21-237D-4629-964C-408B5AD590E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB62C534-29F8-48CA-9D45-42C49CE68577",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F956BF-E845-43FF-87A8-EA62DDFB1228",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B670C5A3-4E19-428F-87D0-C2B12EE2CB92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4541452E-32E8-451B-B8F3-1118ECCBAE50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C512E9-F7A6-492E-BE4B-93858E34CCD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8D39174-298E-4C06-A289-B0C4585B2E99",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6041298-45A9-41CB-A644-55D5DC40B5D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB259DDC-AB98-405E-A369-49A3B89F48F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1385AA-FACE-4150-93E8-610A73F90CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B57D05-6702-4026-9E36-0CBEC6BE8001",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "715401BE-1E29-4260-9D10-245C6246BE94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC62F7A8-9D57-4703-A7DF-451C2CA75919",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC762476-57D4-40E8-BE70-2F6861F31EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "795A3C41-753D-4590-B71F-37E9DD7DD5D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61BD4298-A8D5-4D7C-A9D9-694606042C12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF406E2-A24B-4D94-B4F7-2186B1D82462",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC624300-4EBB-44B9-9D90-F411368FE60A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B44092-CC37-4683-920D-8F84C60CCCEF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9005D484-CEF5-4B8D-86B0-6CB5860A157E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06205774-F85A-42F8-B599-1A529BBFA68B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60D19311-A114-455C-9011-004446C80E27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C922D55-E2DC-4970-A381-30F95CEB038B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "602DA0AF-86EB-4A01-BDE3-43596DEC746A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E011F146-3AB9-446D-ACFD-FE5B021735D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E670DC-C4D2-4277-A4DD-222D60A7CDB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7449719-1071-41B8-BDE9-81ACFBEE5D0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "814ADA42-72A9-48D6-B524-5F5BD76F3059",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25616833-BCF6-4611-A9AB-248F761C5603",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A66108F-5CED-4D41-8EE9-9479090B31DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92DD4610-420C-459B-9B05-85600EF466D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E7D194-AA15-43CD-9019-7B286F528773",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B15252-5725-4B7B-8DBE-10251EB9C212",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB4754D-3B94-42AA-A150-6BDFF42B3270",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63217CCA-1926-46AD-956E-702A94420D91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E495B6-CA7A-4F58-99A2-550F83E1E020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F47740-D0F3-478B-AFC3-51EB3AED34A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56150-D025-40A9-B350-8E95B62D236C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E9718F-E50B-412F-86D7-DA6F39056006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B83072-84F6-43A4-9CC1-32924AFCC737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1F09491-2234-4C86-A80C-445B48A9FE78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5634D1AB-B64D-44D0-A431-FE52E879B4BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8998B44-D926-46F9-AF3F-02EEF99680A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "920CF4B6-9424-48DA-9622-FB0C0510E52F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EC322AE-6731-41F3-9C59-8CF9622D997A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79419F89-0F01-4FD7-9102-ABFAFF3F2424",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0036877-C975-4AC7-B933-E5BC5E300B44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC64210E-A2F8-42DC-AB94-2547A51F63C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37474E5-76DE-4326-A5A8-D8900A8A2F62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "089164E3-B852-43BA-8C2C-FEE1C267C58C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8F3095-F280-44B0-8BC6-50221247ACE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27DA3F64-514B-4DB7-A6B0-6A303F296DC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB99337-4422-46AB-9B79-A96CE207AC28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD532656-21FE-4F82-846E-C8CB752B87F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37D7E013-920A-4C32-98C1-FBD7C450DD88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E80D395-C853-41A3-8438-BF880C799A01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "366ABABA-D9C5-4D46-9516-7262AA32D4CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D071FC26-097A-432B-8900-DA02D3116D29",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D4901FE-B1AE-4CAB-9D91-139737B6E832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9543B910-A999-4CEF-B06A-3F1A46784BF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC06358C-6F27-4A27-8553-CF138D4214CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57AA24E-09E0-4EB6-9580-A68267767119",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AD96C5-1620-4339-94E7-343E1ADAAC4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F910935-E534-462D-8045-71C58BDD7285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85585DA-C918-445B-9B44-B2B1A982A1F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F5CB3-1AE0-4905-A28B-090FDA56622E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39884334-73AF-4E98-B05A-20FFF82B5DF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF67F0-973F-4FD1-8077-CE68D2AB1149",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CF5026-CC39-48FF-A8F0-8E31A425343E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A0EF95-7CC5-4EE2-A5D8-803195F63F49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6554B9F-CD89-49B4-B55A-510B1C881C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68546316-D08D-4E0B-BDDE-BF6320B730EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FDA9FB-BB79-4A60-B825-D68B3719BFE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5565DF04-82F3-40C7-8E82-44A0DA72398B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15073B83-81ED-4E98-8521-1320F8120C3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31842684-B05D-4E17-9229-EC6993E78612",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69224767-0E2B-4A85-A7F1-77C6B41668DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90095155-ABC0-43C9-896A-55A797EC2055",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A983D4D-9E04-45CE-BE3C-9FCD0018837F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ABF29-B908-4A43-B3CC-9145721727A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A36CB8A-C74F-46B4-BFCE-523488D33B93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD45F341-FAD8-4B10-B28C-8697E51C6B61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5631A8-0201-432E-9912-B99D44D757DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB2955F-2C82-4668-8C0B-412BEFE0E09E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16E007C-A310-474D-8174-EC98FEDDCE76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E028E3-2DEB-4015-9BB0-97413DE60A47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE92390-9835-4556-A439-5A6FE108A9AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B47AE71-CF1B-402B-BB60-645A856A632D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3610C3BC-6994-443F-BD27-0D11293C4079",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AD5AD81-0976-483E-AA31-6D53A63A8D90",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D7CC29-6916-4A75-86DE-0BC4FBA3A639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D320D1AC-EAA7-45FD-B932-FC9554934BC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662CE728-C754-465B-A4AC-E63D5115EFC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "160C541B-2617-4199-914D-ECE3A0791397",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9C7F70F-207C-4D8C-8C3E-08C7772810F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA4C0E13-8027-4375-AA26-764DAD7E3C9B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A4744B-DA96-4614-AA99-9198A6D4C442",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63756272-F713-4249-91C2-F29A382C63A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42D55365-A759-4F72-B85D-5C13710F2AF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8531052-3602-4309-93A9-CA7020EF95F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB831D03-30CD-4218-9E69-13FC12115805",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049297F7-84C0-4AD0-8806-AA41AC02CEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C67C7D-DA10-47A7-8407-5624981DFBE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en el controlador ALFA de Windows 10 versi\u00f3n 6.1316.1209 para AWUS036H. Las implementaciones WEP, WPA, WPA2 y WPA3 aceptan tramas de texto plano en una red Wi-Fi protegida. Un adversario puede abusar de esto para inyectar tramas de datos arbitrarias independientes de la configuraci\u00f3n de la red"
    }
  ],
  "id": "CVE-2020-26140",
  "lastModified": "2024-11-21T05:19:20.550",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-11T20:15:08.687",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.fragattacks.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "737D8F44-EAAA-4591-AD9F-A66BD64A1B33",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FA5BEED-7B2D-4F4E-8D67-63ABECA22279",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53570BEB-16D3-4CB7-94E4-6DE1A4427F0A",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CECF0B-922B-45CA-9312-05FB5C6BC9E6",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C5D961-BED9-4621-BDDD-2DB707DBC0AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "035032FB-3D4E-47D2-B1E5-A80B8ED04397",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "641D6161-CB22-4627-BF74-616011302802",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E173DAAF-7F3F-4652-9F49-3F3B0CE66596",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D36BB4F-3FBA-4D24-83A5-6BD8A6EC4DDB",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92ECE07F-7E95-4BF0-A9DC-B1DB336A2B8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites en el firmware de algunos productos Intel(R) Wireless Bluetooth(R) y Killer(TM) Bluetooth(R) versiones anteriores a 22.120, puede permitir que un usuario privilegiado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local."
    }
  ],
  "id": "CVE-2021-23179",
  "lastModified": "2024-11-21T05:51:20.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.183",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66434F2B-0ED8-4364-9281-8A438B8D337D",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario autenticado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio del acceso local."
    }
  ],
  "id": "CVE-2021-23188",
  "lastModified": "2024-11-21T05:51:20.787",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.227",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:55
Summary
Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access..



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.."
    },
    {
      "lang": "es",
      "value": "La inicializaci\u00f3n incorrecta de algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-28720",
  "lastModified": "2024-11-21T07:55:52.187",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:48.273",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware para Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de acceso adyacente"
    }
  ],
  "id": "CVE-2021-0165",
  "lastModified": "2024-11-21T05:42:06.950",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.147",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:41
Summary
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel amt_ac_8260_firmware *
intel amt_ac_8260 -
intel amt_ac_8265_firmware *
intel amt_ac_8265 -
intel amt_ac_9260_firmware *
intel amt_ac_9260 -
intel amt_ac_9560_firmware *
intel amt_ac_9560 -
intel amt_wi-fi_6_ax200_firmware *
intel amt_wi-fi_6_ax200_firmware *
intel amt_wi-fi_6_ax200_firmware *
intel amt_wi-fi_6_ax200 -
intel amt_wi-fi_6_ax201_firmware *
intel amt_wi-fi_6_ax201_firmware *
intel amt_wi-fi_6_ax201 -
intel amt_wi-fi_6_ax210_firmware *
intel amt_wi-fi_6_ax210 -
intel proset_ac_3165_firmware *
intel proset_ac_3165 -
microsoft windows -
intel proset_ac_3168_firmware *
intel proset_ac_3168 -
microsoft windows -
intel proset_ac_8260_firmware *
intel proset_ac_8260 -
microsoft windows -
intel proset_ac_8265_firmware *
intel proset_ac_8265 -
microsoft windows -
intel proset_ac_9260_firmware *
intel proset_ac_9260 -
microsoft windows -
intel proset_ac_9461_firmware *
intel proset_ac_9461 -
microsoft windows -
intel proset_ac_9462_firmware *
intel proset_ac_9462 -
microsoft windows -
intel proset_ac_9560_firmware *
intel proset_ac_9560 -
microsoft windows -
intel proset_wi-fi_6_ax200_firmware *
intel proset_wi-fi_6_ax200 -
microsoft windows -
intel proset_wi-fi_6_ax201_firmware *
intel proset_wi-fi_6_ax201 -
microsoft windows -
intel proset_wi-fi_6e_ax210_firmware *
intel proset_wi-fi_6e_ax210 -
microsoft windows -
intel proset_wireless_7265_\(rev_d\)_firmware *
intel proset_wireless_7265_\(rev_d\) -
microsoft windows -
intel killer_ac_1550_firmware *
intel killer_ac_1550 -
microsoft windows -
intel killer_wi-fi_6_ax1650_firmware *
intel killer_wi-fi_6_ax1650 -
microsoft windows -
intel killer_wi-fi_6e_ax1675_firmware *
intel killer_wi-fi_6e_ax1675 -
microsoft windows -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware para Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0066",
  "lastModified": "2024-11-21T05:41:47.043",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:10.900",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware para algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio del acceso local"
    }
  ],
  "id": "CVE-2021-0168",
  "lastModified": "2024-11-21T05:42:07.350",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.260",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:53
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel killer_wifi_software *
intel proset\/wireless_wifi *
intel uefi_wifi_driver *
intel killer_wi-fi_6_ax1650_firmware -
intel killer_wi-fi_6_ax1650 -
intel killer_wi-fi_6e_ax1675_firmware -
intel killer_wi-fi_6e_ax1675 -
intel killer_wi-fi_6e_ax1690_firmware -
intel killer_wi-fi_6e_ax1690 -
intel wi-fi_6_ax200_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201_firmware -
intel wi-fi_6_ax201 -
intel wi-fi_6_ax210_firmware -
intel wi-fi_6_ax210 -
intel wi-fi_6_ax211_firmware -
intel wi-fi_6_ax211 -
intel wi-fi_6_ax411_firmware -
intel wi-fi_6_ax411 -
intel converged_security_and_manageability_engine *
intel core_i3-12100_firmware -
intel core_i3-12100f_firmware -
intel core_i3-12100t_firmware -
intel core_i3-1210u_firmware -
intel core_i3-1215u_firmware -
intel core_i3-1220p_firmware -
intel core_i3-12300_firmware -
intel core_i3-12300t_firmware -
intel core_i5-1230u_firmware -
intel core_i5-1235u_firmware -
intel core_i5-12400_firmware -
intel core_i5-12400f_firmware -
intel core_i5-12400t_firmware -
intel core_i5-1240p_firmware -
intel core_i5-1240u_firmware -
intel core_i5-12450h_firmware -
intel core_i5-12450hx_firmware -
intel core_i5-1245u_firmware -
intel core_i5-12500_firmware -
intel core_i5-12500h_firmware -
intel core_i5-12500t_firmware -
intel core_i5-1250p_firmware -
intel core_i5-12600_firmware -
intel core_i5-12600h_firmware -
intel core_i5-12600hx_firmware -
intel core_i5-12600k_firmware -
intel core_i5-12600kf_firmware -
intel core_i5-12600t_firmware -
intel core_i7-1250u_firmware -
intel core_i7-1255u_firmware -
intel core_i7-1260p_firmware -
intel core_i7-1260u_firmware -
intel core_i7-12650h_firmware -
intel core_i7-12650hx_firmware -
intel core_i7-1265u_firmware -
intel core_i7-12700_firmware -
intel core_i7-12700f_firmware -
intel core_i7-12700h_firmware -
intel core_i7-12700k_firmware -
intel core_i7-12700kf_firmware -
intel core_i7-12700t_firmware -
intel core_i7-1270p_firmware -
intel core_i7-12800h_firmware -
intel core_i7-12800hx_firmware -
intel core_i7-1280p_firmware -
intel core_i7-12850hx_firmware -
intel core_i9-12900_firmware -
intel core_i9-12900f_firmware -
intel core_i9-12900h_firmware -
intel core_i9-12900hk_firmware -
intel core_i9-12900hx_firmware -
intel core_i9-12900k_firmware -
intel core_i9-12900kf_firmware -
intel core_i9-12900t_firmware -
intel core_i9-12950hx_firmware -
intel wi-fi_6e_ax210 -
intel wi-fi_6e_ax211 -
intel converged_security_and_manageability_engine *
intel core_i3-12100_firmware -
intel core_i3-12100f_firmware -
intel core_i3-12100t_firmware -
intel core_i3-1210u_firmware -
intel core_i3-1215u_firmware -
intel core_i3-1220p_firmware -
intel core_i3-12300_firmware -
intel core_i3-12300t_firmware -
intel core_i5-1230u_firmware -
intel core_i5-1235u_firmware -
intel core_i5-12400_firmware -
intel core_i5-12400f_firmware -
intel core_i5-12400t_firmware -
intel core_i5-1240p_firmware -
intel core_i5-1240u_firmware -
intel core_i5-12450h_firmware -
intel core_i5-12450hx_firmware -
intel core_i5-1245u_firmware -
intel core_i5-12500_firmware -
intel core_i5-12500h_firmware -
intel core_i5-12500t_firmware -
intel core_i5-1250p_firmware -
intel core_i5-12600_firmware -
intel core_i5-12600h_firmware -
intel core_i5-12600hx_firmware -
intel core_i5-12600k_firmware -
intel core_i5-12600kf_firmware -
intel core_i5-12600t_firmware -
intel core_i7-1250u_firmware -
intel core_i7-1255u_firmware -
intel core_i7-1260p_firmware -
intel core_i7-1260u_firmware -
intel core_i7-12650h_firmware -
intel core_i7-12650hx_firmware -
intel core_i7-1265u_firmware -
intel core_i7-12700_firmware -
intel core_i7-12700f_firmware -
intel core_i7-12700h_firmware -
intel core_i7-12700k_firmware -
intel core_i7-12700kf_firmware -
intel core_i7-12700t_firmware -
intel core_i7-1270p_firmware -
intel core_i7-12800h_firmware -
intel core_i7-12800hx_firmware -
intel core_i7-1280p_firmware -
intel core_i7-12850hx_firmware -
intel core_i9-12900_firmware -
intel core_i9-12900f_firmware -
intel core_i9-12900h_firmware -
intel core_i9-12900hk_firmware -
intel core_i9-12900hx_firmware -
intel core_i9-12900k_firmware -
intel core_i9-12900kf_firmware -
intel core_i9-12900t_firmware -
intel core_i9-12950hx_firmware -
intel wi-fi_6e_ax210 -
intel wi-fi_6e_ax211 -
intel converged_security_and_manageability_engine *
intel core_i3-11100b_firmware -
intel core_i3-11100he_firmware -
intel core_i3-1110g4_firmware -
intel core_i3-1115g4_firmware -
intel core_i3-1115g4e_firmware -
intel core_i3-1115gre_firmware -
intel core_i3-1120g4_firmware -
intel core_i3-1125g4_firmware -
intel core_i5-11260h_firmware -
intel core_i5-11300h_firmware -
intel core_i5-1130g7_firmware -
intel core_i5-11320h_firmware -
intel core_i5-1135g7_firmware -
intel core_i5-11400_firmware -
intel core_i5-11400f_firmware -
intel core_i5-11400h_firmware -
intel core_i5-11400t_firmware -
intel core_i5-1140g7_firmware -
intel core_i5-1145g7_firmware -
intel core_i5-1145g7e_firmware -
intel core_i5-1145gre_firmware -
intel core_i5-11500_firmware -
intel core_i5-11500b_firmware -
intel core_i5-11500h_firmware -
intel core_i5-11500he_firmware -
intel core_i5-11500t_firmware -
intel core_i5-1155g7_firmware -
intel core_i5-11600_firmware -
intel core_i5-11600k_firmware -
intel core_i5-11600kf_firmware -
intel core_i5-11600t_firmware -
intel core_i7-11370h_firmware -
intel core_i7-11375h_firmware -
intel core_i7-11390h_firmware -
intel core_i7-11600h_firmware -
intel core_i7-1160g7_firmware -
intel core_i7-1165g7_firmware -
intel core_i7-11700_firmware -
intel core_i7-11700b_firmware -
intel core_i7-11700f_firmware -
intel core_i7-11700k_firmware -
intel core_i7-11700kf_firmware -
intel core_i7-11700t_firmware -
intel core_i7-11800h_firmware -
intel core_i7-1180g7_firmware -
intel core_i7-11850h_firmware -
intel core_i7-11850he_firmware -
intel core_i7-1185g7_firmware -
intel core_i7-1185g7e_firmware -
intel core_i7-1185gre_firmware -
intel core_i7-1195g7_firmware -
intel core_i9-11900_firmware -
intel core_i9-11900f_firmware -
intel core_i9-11900h_firmware -
intel core_i9-11900k_firmware -
intel core_i9-11900kb_firmware -
intel core_i9-11900kf_firmware -
intel core_i9-11900t_firmware -
intel core_i9-11950h_firmware -
intel core_i9-11980hk_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201 -
intel wi-fi_6_ax210 -
intel converged_security_and_manageability_engine *
intel core_i3-1000g1_firmware -
intel core_i3-1000g4_firmware -
intel core_i3-1000ng4_firmware -
intel core_i3-1005g1_firmware -
intel core_i3-10100_firmware -
intel core_i3-10100e_firmware -
intel core_i3-10100f_firmware -
intel core_i3-10100t_firmware -
intel core_i3-10100te_firmware -
intel core_i3-10100y_firmware -
intel core_i3-10105_firmware -
intel core_i3-10105f_firmware -
intel core_i3-10105t_firmware -
intel core_i3-10110u_firmware -
intel core_i3-10110y_firmware -
intel core_i3-10300_firmware -
intel core_i3-10300t_firmware -
intel core_i3-10305_firmware -
intel core_i3-10305t_firmware -
intel core_i3-10320_firmware -
intel core_i3-10325_firmware -
intel core_i5-10110y_firmware -
intel core_i5-10200h_firmware -
intel core_i5-10210u_firmware -
intel core_i5-10210y_firmware -
intel core_i5-10300h_firmware -
intel core_i5-1030g4_firmware -
intel core_i5-1030g7_firmware -
intel core_i5-1030ng7_firmware -
intel core_i5-10310u_firmware -
intel core_i5-10310y_firmware -
intel core_i5-1035g1_firmware -
intel core_i5-1035g4_firmware -
intel core_i5-1035g7_firmware -
intel core_i5-1038ng7_firmware -
intel core_i5-10400_firmware -
intel core_i5-10400f_firmware -
intel core_i5-10400h_firmware -
intel core_i5-10400t_firmware -
intel core_i5-10500_firmware -
intel core_i5-10500e_firmware -
intel core_i5-10500h_firmware -
intel core_i5-10500t_firmware -
intel core_i5-10500te_firmware -
intel core_i5-10505_firmware -
intel core_i5-10600_firmware -
intel core_i5-10600k_firmware -
intel core_i5-10600kf_firmware -
intel core_i5-10600t_firmware -
intel core_i5-10610u_firmware -
intel core_i7-10510u_firmware -
intel core_i7-10510y_firmware -
intel core_i7-1060g7_firmware -
intel core_i7-1060ng7_firmware -
intel core_i7-10610u_firmware -
intel core_i7-1065g7_firmware -
intel core_i7-1068ng7_firmware -
intel core_i7-10700_firmware -
intel core_i7-10700e_firmware -
intel core_i7-10700f_firmware -
intel core_i7-10700k_firmware -
intel core_i7-10700kf_firmware -
intel core_i7-10700t_firmware -
intel core_i7-10700te_firmware -
intel core_i7-10710u_firmware -
intel core_i7-10750h_firmware -
intel core_i7-10810u_firmware -
intel core_i7-10850h_firmware -
intel core_i7-10870h_firmware -
intel core_i7-10875h_firmware -
intel core_i9-10850h_firmware -
intel core_i9-10850k_firmware -
intel core_i9-10885h_firmware -
intel core_i9-10900_firmware -
intel core_i9-10900e_firmware -
intel core_i9-10900f_firmware -
intel core_i9-10900k_firmware -
intel core_i9-10900kf_firmware -
intel core_i9-10900t_firmware -
intel core_i9-10900te_firmware -
intel core_i9-10900x_firmware -
intel core_i9-10910_firmware -
intel core_i9-10920x_firmware -
intel core_i9-10940x_firmware -
intel core_i9-10980hk_firmware -
intel core_i9-10980xe_firmware -
intel wi-fi_6_ax200 -
intel wi-fi_6_ax201 -
intel wi-fi_6e_ax210 -
intel converged_security_and_manageability_engine *
intel core_i3-9100_firmware -
intel core_i3-9100e_firmware -
intel core_i3-9100f_firmware -
intel core_i3-9100hl_firmware -
intel core_i3-9100t_firmware -
intel core_i3-9100te_firmware -
intel core_i3-9130u_firmware -
intel core_i3-9300_firmware -
intel core_i3-9300t_firmware -
intel core_i3-9320_firmware -
intel core_i3-9350k_firmware -
intel core_i3-9350kf_firmware -
intel core_i5-9300h_firmware -
intel core_i5-9300hf_firmware -
intel core_i5-9400_firmware -
intel core_i5-9400f_firmware -
intel core_i5-9400h_firmware -
intel core_i5-9400t_firmware -
intel core_i5-9500_firmware -
intel core_i5-9500e_firmware -
intel core_i5-9500f_firmware -
intel core_i5-9500t_firmware -
intel core_i5-9500te_firmware -
intel core_i5-9600_firmware -
intel core_i5-9600k_firmware -
intel core_i5-9600kf_firmware -
intel core_i5-9600t_firmware -
intel core_i7-9700_firmware -
intel core_i7-9700e_firmware -
intel core_i7-9700f_firmware -
intel core_i7-9700k_firmware -
intel core_i7-9700kf_firmware -
intel core_i7-9700t_firmware -
intel core_i7-9700te_firmware -
intel core_i7-9750h_firmware -
intel core_i7-9750hf_firmware -
intel core_i7-9800x_firmware -
intel core_i7-9850h_firmware -
intel core_i7-9850he_firmware -
intel core_i7-9850hl_firmware -
intel core_i9-9800x_firmware -
intel core_i9-9820x_firmware -
intel core_i9-9880h_firmware -
intel core_i9-9900_firmware -
intel core_i9-9900k_firmware -
intel core_i9-9900kf_firmware -
intel core_i9-9900ks_firmware -
intel core_i9-9900t_firmware -
intel core_i9-9900x_firmware -
intel core_i9-9920x_firmware -
intel core_i9-9940x_firmware -
intel core_i9-9960x_firmware -
intel core_i9-9980hk_firmware -
intel core_i9-9980xe_firmware -
intel core_i9-9980xe_firmware -
intel wi-fi_6_ax200 -
intel converged_security_and_manageability_engine *
intel core_i3-8000_firmware -
intel core_i3-8000t_firmware -
intel core_i3-8020_firmware -
intel core_i3-8100_firmware -
intel core_i3-8100b_firmware -
intel core_i3-8100h_firmware -
intel core_i3-8100t_firmware -
intel core_i3-8109u_firmware -
intel core_i3-8120_firmware -
intel core_i3-8121u_firmware -
intel core_i3-8130u_firmware -
intel core_i3-8140u_firmware -
intel core_i3-8145u_firmware -
intel core_i3-8145ue_firmware -
intel core_i3-8300_firmware -
intel core_i3-8300t_firmware -
intel core_i3-8350k_firmware -
intel core_i5-8200y_firmware -
intel core_i5-8210y_firmware -
intel core_i5-8250u_firmware -
intel core_i5-8257u_firmware -
intel core_i5-8259u_firmware -
intel core_i5-8260u_firmware -
intel core_i5-8265u_firmware -
intel core_i5-8269u_firmware -
intel core_i5-8279u_firmware -
intel core_i5-8300h_firmware -
intel core_i5-8305g_firmware -
intel core_i5-8310y_firmware -
intel core_i5-8350u_firmware -
intel core_i5-8365u_firmware -
intel core_i5-8365ue_firmware -
intel core_i5-8400_firmware -
intel core_i5-8400b_firmware -
intel core_i5-8400h_firmware -
intel core_i5-8400t_firmware -
intel core_i5-8420_firmware -
intel core_i5-8420t_firmware -
intel core_i5-8500_firmware -
intel core_i5-8500b_firmware -
intel core_i5-8500t_firmware -
intel core_i5-8550_firmware -
intel core_i5-8550u_firmware -
intel core_i5-8600_firmware -
intel core_i5-8600k_firmware -
intel core_i5-8600t_firmware -
intel core_i5-8650_firmware -
intel core_i5-8650k_firmware -
intel core_i5-8700b_firmware -
intel core_i7-8086k_firmware -
intel core_i7-8500y_firmware -
intel core_i7-8510y_firmware -
intel core_i7-8550u_firmware -
intel core_i7-8557u_firmware -
intel core_i7-8559u_firmware -
intel core_i7-8560u_firmware -
intel core_i7-8565u_firmware -
intel core_i7-8569u_firmware -
intel core_i7-8650u_firmware -
intel core_i7-8665u_firmware -
intel core_i7-8665ue_firmware -
intel core_i7-8670_firmware -
intel core_i7-8670t_firmware -
intel core_i7-8700_firmware -
intel core_i7-8700b_firmware -
intel core_i7-8700k_firmware -
intel core_i7-8700t_firmware -
intel core_i7-8705g_firmware -
intel core_i7-8706g_firmware -
intel core_i7-8709g_firmware -
intel core_i7-8750h_firmware -
intel core_i7-8750hf_firmware -
intel core_i7-8809g_firmware -
intel core_i7-8850h_firmware -
intel core_i9-8950hk_firmware -
intel wi-fi_6_ax200 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer_wifi_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D0A60D-A406-4381-AF97-F43C09958373",
              "versionEndExcluding": "3.1122.3158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F65B54B-348E-4868-A53D-27C404F8B398",
              "versionEndExcluding": "22.140",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:uefi_wifi_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D6EBDE-96E0-4446-A8D1-16502969D82B",
              "versionEndExcluding": "2.2.14.22176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E174EDF7-FBDB-411E-B05E-EF48FF0734D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FD8273-3968-4A85-A4FF-00CCE3B89C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2DF0C27-886C-48F8-83DA-85BE0F239DD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C7F1E8-9939-452B-B166-35F4CAC73F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax211_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C25171-A7D3-4C99-B5A1-2EB81D595396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF580051-1047-4677-8B39-8FAC2D642BC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax411_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BA0FB5-002D-4556-BF7E-BD5D5E68B451",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43305255-1AEE-4CF3-8226-EB9968A7CB52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33703EA-B5EF-41FF-8C5F-95F750D5387E",
              "versionEndExcluding": "16.1.25.1885v2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE550D6B-5197-461E-9F5B-295AB7F0BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C0C60C-7CF4-4A14-82F1-F0E574F7435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6954078-D47E-4E54-8CDB-1CCF4EE09C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E28C4D-97DC-4D75-A527-5D3606305B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14957D81-CB3A-4C3F-A88B-E2EEAA9ABB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C89A0-CC1C-49EE-B10D-63B98C00F3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB76AA51-27B9-4542-9E69-CA98FC7AC1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3D0F83-B6B8-42ED-91E6-D7626F03F2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCCF50F-9ABA-4A3D-B10C-15FA30720560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C973EA-12D7-4CF0-B343-4BE188DCDA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA543A5B-2DB1-484E-8C10-72B2D7483AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1105DE29-E206-4CA3-9D65-F36D96836F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "726420C9-2E0C-4B33-B5E0-D9C9DC9120D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6020A1-F88B-4903-984E-E394C8455518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE81AD5E-7D46-4534-A0E2-0A988B91325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C9476-CBC1-4D9E-A9C3-5443C8864F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51E74CB-FA01-4D78-85FE-3C17945E4FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B2F36D-369D-44A8-85B2-E75E7204D33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5855F355-5BA9-4EB6-922A-D2DAE5002247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDD387-B4BA-4403-B468-718B11E4D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D124457-2879-47F6-892D-76A4D94D1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A00C1C5-8F0D-45E7-B6FB-8D588D400F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CD143-5B44-49ED-A958-EB01E3606292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B66DA2-62B0-4267-8F9B-820CD1944927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F5DA6C-FEB5-48C3-BF66-F3352F2C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CDCE12-01E6-45DA-B72E-1BE4150BF1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0363669-1973-497A-A7BD-CEC197AEB224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E91FC7C-A392-4CEF-8AE8-8052F5153F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4500975-3845-443F-A67D-93B57324F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76AD3-58B6-4250-97CA-4D7DA77239D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC345E7-58DA-4A7C-9597-D94C2137E128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5E2BA7-DE2B-4357-8438-E812C81F568B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6B92D7-5FF4-4171-AB1F-46C94E48BC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A9DA1-A6EE-4E0A-BD4A-693CB01F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C0C316-08A1-492A-ACB4-9CAC6C66583E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A0388B-1227-4D61-AB19-145E725E2673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46779A84-F8E4-4AFC-8B93-A60CD31B3511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA30873-0BF9-4D36-ABFD-9AF14C104B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0402CD-AC88-4C2B-9CC1-EA9ED953DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8F0737-3F6C-4FBD-A3B5-23580E93041F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E05F6-E2DF-49C8-97D2-2978602C564C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440BD75-463D-4FB5-A0E8-F9992D5E604F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF771F3-E51D-44C8-A354-1989114899C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEC1232-ED43-48C8-BF9D-8AC5F97220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4066C0-0E3D-4181-8093-FB4B68AAE7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A030112-DE68-4596-A91C-7FD0B11770BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A160216C-95AD-42A7-9532-E1EA97A7CBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03484640-6AFE-425C-90A0-0AF5C5F3D92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3595DC8A-DA7A-4C2A-80A6-40FDBC87053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA5C2F-6184-4FAA-919F-EAA4E95458B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F7A967-B433-46C8-9742-47C073D59F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13A666A-B39F-4359-A638-29B6F0EBBB83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEAA993-1F40-4045-B1A8-6D1995F7D057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88759768-F065-4959-AA26-0F14AC2BEB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541B4AC-CF73-452D-9489-91ECCDFE7F33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3735297F-E6FE-4AB6-80BD-E498F84E32C1",
              "versionEndExcluding": "16.1.25.1865v6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE550D6B-5197-461E-9F5B-295AB7F0BFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C0C60C-7CF4-4A14-82F1-F0E574F7435E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6954078-D47E-4E54-8CDB-1CCF4EE09C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E28C4D-97DC-4D75-A527-5D3606305B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14957D81-CB3A-4C3F-A88B-E2EEAA9ABB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02C89A0-CC1C-49EE-B10D-63B98C00F3BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB76AA51-27B9-4542-9E69-CA98FC7AC1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A3D0F83-B6B8-42ED-91E6-D7626F03F2BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCCF50F-9ABA-4A3D-B10C-15FA30720560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61C973EA-12D7-4CF0-B343-4BE188DCDA68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA543A5B-2DB1-484E-8C10-72B2D7483AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1105DE29-E206-4CA3-9D65-F36D96836F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "726420C9-2E0C-4B33-B5E0-D9C9DC9120D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6020A1-F88B-4903-984E-E394C8455518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE81AD5E-7D46-4534-A0E2-0A988B91325A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43C9476-CBC1-4D9E-A9C3-5443C8864F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51E74CB-FA01-4D78-85FE-3C17945E4FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B2F36D-369D-44A8-85B2-E75E7204D33D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5855F355-5BA9-4EB6-922A-D2DAE5002247",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDD387-B4BA-4403-B468-718B11E4D13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D124457-2879-47F6-892D-76A4D94D1B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A00C1C5-8F0D-45E7-B6FB-8D588D400F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE7CD143-5B44-49ED-A958-EB01E3606292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91B66DA2-62B0-4267-8F9B-820CD1944927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F5DA6C-FEB5-48C3-BF66-F3352F2C2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45CDCE12-01E6-45DA-B72E-1BE4150BF1A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0363669-1973-497A-A7BD-CEC197AEB224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E91FC7C-A392-4CEF-8AE8-8052F5153F6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4500975-3845-443F-A67D-93B57324F29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76AD3-58B6-4250-97CA-4D7DA77239D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC345E7-58DA-4A7C-9597-D94C2137E128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5E2BA7-DE2B-4357-8438-E812C81F568B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6B92D7-5FF4-4171-AB1F-46C94E48BC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876A9DA1-A6EE-4E0A-BD4A-693CB01F7F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C0C316-08A1-492A-ACB4-9CAC6C66583E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A0388B-1227-4D61-AB19-145E725E2673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46779A84-F8E4-4AFC-8B93-A60CD31B3511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA30873-0BF9-4D36-ABFD-9AF14C104B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0402CD-AC88-4C2B-9CC1-EA9ED953DF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8F0737-3F6C-4FBD-A3B5-23580E93041F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E05F6-E2DF-49C8-97D2-2978602C564C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4440BD75-463D-4FB5-A0E8-F9992D5E604F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF771F3-E51D-44C8-A354-1989114899C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEEC1232-ED43-48C8-BF9D-8AC5F97220DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B4066C0-0E3D-4181-8093-FB4B68AAE7BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A030112-DE68-4596-A91C-7FD0B11770BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A160216C-95AD-42A7-9532-E1EA97A7CBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03484640-6AFE-425C-90A0-0AF5C5F3D92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3595DC8A-DA7A-4C2A-80A6-40FDBC87053E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CA5C2F-6184-4FAA-919F-EAA4E95458B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03F7A967-B433-46C8-9742-47C073D59F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E13A666A-B39F-4359-A638-29B6F0EBBB83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFEAA993-1F40-4045-B1A8-6D1995F7D057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88759768-F065-4959-AA26-0F14AC2BEB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A541B4AC-CF73-452D-9489-91ECCDFE7F33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77359153-675C-47D3-9A00-0BAD9BE26CD8",
              "versionEndExcluding": "15.0.42.2235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-11100b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0464200B-C3A6-40ED-8261-DBA638484CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90291EE5-655A-4298-AF37-919EA2BC37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CD246D-3703-45A3-9CD2-17039A3B6C96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CFB83C-DB26-4E52-AF8A-ADB6839BDD8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "427C8E57-7E8B-4494-BE0E-E268AB2E4339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372ADB3F-1D20-442A-BCBE-87A41A71093D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36E4714A-A1CF-492C-8553-584A41CA5B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE27BBD-F5C0-47FD-82CB-EF9763DF2866",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A331C0CA-06E5-4C46-91C4-1444780BC2DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69676C95-DB91-4FF2-B3F1-83E95FE84ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99645C51-90F3-4BDA-B9D4-AF747947481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE65B5E-60C0-47FD-B47A-12084959D291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36840EC4-CA42-40B5-8D0E-9CCE86B1A7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04DC8DC6-15AF-4DB0-9A6A-4691FC9D86E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A36BB6-4EDD-4FF9-8786-C2A902C90C9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "427BE96A-0265-4979-8204-D555E601C519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2479723B-92C8-4C15-8766-DB7E1A911BD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18C4D03-8736-48E6-9A91-5D71C2D95AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "844B344E-FA5C-4E66-A7F0-99993CD20ABC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A7B207-2E2C-47DC-9DFD-AF98BA108B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5B827C-FA90-4435-8BC1-78362D79C289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0362D029-F6A8-4A21-A31D-FDB51293928A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A432D21-B015-4F5A-8726-AE506CC490FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "490D9F4F-E489-4502-9194-2EDA44E70F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F19AC344-835E-468B-9FB5-AB64A8A7E9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "720B135D-36C4-4204-A964-7D71DCFAAF29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED643C3A-84A6-4ED0-8A6F-DE160DA93B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3622470-6979-4438-8BDF-549CC339D417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D00D974-CBA7-4362-AF2F-042D15AC9790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F24D3685-6DCA-40D0-8437-B0241A7597ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1089BC24-D092-41FE-8AA5-5742301B99AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E5C4F73-01EC-4396-BDE2-1ACE9E9C8C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80415BA-0D9A-4B96-9BDF-52A45DF82046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9371D656-8665-4D04-93E6-CF9476546BED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EE2586-A95C-4785-A264-39D30D4587E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A2043A3-466C-4142-9B2B-E63D6119ED09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E22745-5399-4CFD-8C4F-4DA52829DB2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "341575DD-4D03-44AC-8DE0-EA2A4768ABD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "579F1B28-1D6A-48DE-ABAB-398198224959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81805C4E-8192-4719-8F3C-6BD8C77E1B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2FF3DD-0986-4FB6-B17B-0AEFB0899672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C4FD26-557D-47F8-9E1C-D337ACDDF51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1327CC4-7F1D-422F-BD11-099D2DC18352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B522B4F-03D8-4BB8-920E-7847298EF9ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF74D5F6-E3F3-40F5-823B-6814458CC541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B89D3F9-351C-4A0D-BD11-1BBE5ABD6B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C114D88-9FC8-4E43-8DD5-CA9618CDC9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58712583-BA04-409D-A43D-AAE4CAC2DC64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E06CE46-0FF7-4831-87B6-FA1EB958CF94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5814CF55-8867-445E-BE1E-795006B0E306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C17F5F-C6AE-4A7C-ACA0-1E8426ADC745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AD8E5F-BA66-4628-ACF0-1891588C0DBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED61822-778A-41FE-A85D-A44D300F800C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04975FEA-10AE-4E5A-A69D-553EE641D18C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "609B3A40-365A-42EE-B1A1-CF73CD41AFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900kb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E481B14-0DEC-4176-B95A-EF53A05D4703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB27F8F4-9A4B-49B4-9286-4D209FBA8961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BFA38A-1059-4607-9CDC-F90DF7B90E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99EB1527-0F25-422C-927D-0ED5924EA83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89B3F38-F128-4173-9DF4-2B5CC5786648",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94EEC111-66D7-4A11-BBCF-9589AFD87A05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51195995-2CB8-4978-B38B-B49E50F6B60C",
              "versionEndExcluding": "14.1.67.2046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75921058-8E13-460F-9F74-AF9C21DF353A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDD752C-BE5E-4EE7-9541-CAE85E5E237A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1000ng4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070EC3E9-B224-49F4-94D5-8A18AD47EBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E2359B-38A9-4962-B819-1C438390BF81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA80297-A747-45A0-81EA-2367F2D88053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "128AF2E8-0FDD-42FA-9F3A-7939E1D06389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BFE70F-8E5F-46C8-8675-3D5C114BF98A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E324A6-6F59-47A2-A941-3CEB70F5B70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73917CEB-A661-4E21-ADB5-2F7C545F937A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB644F0-D66B-4CE6-96A5-5AE895FC0315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88A42CB-3AD3-4621-AA0D-F24636DA9903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD66BFB8-0725-408E-B7C8-9EE2FB5EE1CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33FA193-AA3B-439D-94D4-060172C7D371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE22EAE0-A356-4194-9287-FE70FCE16135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FECACD-46EF-4DBE-ACA9-D0FB9311FCF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE6184E-9929-4F23-8834-9B0E15A4131D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6544E460-1B23-43B5-92A4-13CF61AF08A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A6228E-13A2-47CF-87B4-CB34A1FA4B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F130A798-2FCC-43DB-9A42-367C4BB580E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D72A6E-AAEA-49A8-92D8-FFED7220E263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F542B269-6281-47C4-86CE-72BC9180D90E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F74DD9E-0D1F-44B9-B3CB-7F85F4E540B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "646F0510-9532-466C-B43B-8E869384A52E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1030ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA03DCF-A603-41F8-A38B-6757BFA270FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D96CA5B1-ED93-4423-9C4C-EFCB3F63767A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "530E334B-4B32-4F96-B67B-194A7B46E0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06ECE587-9DC0-4989-97AC-DD2B7EEAE7D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DA87ECA-F5EC-42A5-8A43-6D47242A2756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3F8BD6-027E-4A6A-B7FC-99443BC13A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "255A4636-57B9-491E-B213-02E3B4EFB6B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "150F855A-EC0D-483F-99A8-DDD33AAE1F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "497FAB39-DA53-4447-B1FC-144C725135D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2115591-782B-492C-9A43-1EF612309E6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BC109D-F210-4BB0-80B1-BC877F322E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA43369-7A3F-45F4-B45C-0435499336CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388D5427-0439-4F89-9D80-3AEDB853B2CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E50D6E-C759-46F4-A794-5DD83E971BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AA0B0A-19E2-4F4B-B1E1-09F4DFED737B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21EAC0D6-D5E2-42D6-B105-BCF09C35BC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3548B071-7C6E-402D-8292-84E1400BDC07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-10610u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB122B67-2D59-445D-855E-6C79A385DE08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED7ED67-CE89-4585-A146-E9B1C5CFFCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1060ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92A3211-DD20-49BA-A1DA-615D823A42A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C752B58-0750-4487-845B-9D657079BDED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA13A2D-14CE-4C48-A746-E6068BA343EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA2457A-D89A-4F3E-95D3-3C839F3C0365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A6D39D-7897-48E4-BEB3-7D71E8E42EEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95AC35A3-6F6D-4F61-872E-6E73F958449B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD3DB08-E718-4A66-A1AC-B31FA97E42C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E029771-4205-49E6-9635-E03A66F877FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9D6D38-180E-4CD1-B6A6-765E67DF97B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D41E4EDE-51B2-4618-AD9B-AEDF07D47775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B232700-BC3E-49B0-9814-FB37958B6CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85113D54-52E5-4372-8FD5-DC37DCBE9DA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "215576B4-3ABA-4F65-8DA4-F07C1750C99B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBEEB17-29AB-4F3A-A0CC-68386A315050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA7D248-0833-44D6-81A6-FFD24E54AE80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB36606-33D0-42DF-A7B5-ED4E5E7061A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E412013-D537-4E86-AA5C-08016531405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8CF9E46-7F23-4910-B09C-E2BADDC793B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B82BF5-F105-4686-A352-6BDD7FB2DC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF885F34-941A-4147-B755-3260A22A6825",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C04E06-708E-4103-9238-A7451189DBB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6428C73-6A64-4619-983F-3871B4CE1472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "576C6801-0DBF-4D1C-B5CF-55E25BDFFD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "465D3B92-2BC3-4F0A-A792-564361B2A1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "916A238A-64B9-483C-A0FB-8144B4D5EFFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BE472FC-4776-4FD1-AE36-3D9934A60BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10910_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5351528-6FC1-4CA4-82E8-BC252A950B34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "470B28CA-4990-4AF8-9CF5-C2A1B037FFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F8E079-4941-4878-8DC3-4B74BD832724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4648D9A9-4050-4753-A7B3-E56C0F7E22F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8583AC-0D66-466C-8024-15A520803534",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAD995C-5D8D-4FE1-91BF-45FF893E7C0C",
              "versionEndExcluding": "12.0.92.2145v3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B8A8CC-9009-4CF0-894F-97079FD27796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62EB1BA-2704-4A4D-BA6D-F8BFE748D0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E4F07F-B972-423F-BCFF-E27B3207B493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2908EB-97F4-4DAE-802F-1011FD2587DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD20B8F2-FCD6-454F-955F-9F59B140593C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6FA4984-0018-40A5-99F8-C6FF809F9494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9130u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F454B00-67EF-468A-88DA-C98C67FC0942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "196BA038-162F-4E30-8DE3-6FFB35102A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "769E9A01-C94B-4254-8510-ABE32567E22D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC85FC5-274A-43B1-A9B6-245130812551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777DB8E3-3958-40F0-BF2D-B319F9FA3795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E9BA09-E255-438E-9938-3F51A78A3331",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BFA4824-F934-4602-A6ED-A14B602A4575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC4DDD41-51CD-40FF-BCB0-29D559C1CAD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95AB3F9-7B28-46F8-8882-4976DBBCC767",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF61383-1558-4AE6-97ED-3B8A20667EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C646A5D0-1A9D-4E65-AC62-070959C38CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "060B891D-A885-4BE5-B4C4-3384CBBF2B28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE853A14-BAA9-4B48-8B0A-F5DAE8D051CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F5E016-5AB5-4DB5-BDB0-75AE14253413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "662A5846-DA15-431B-9392-F0BA5457FDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "199A5D61-EB42-4C3C-9344-4CA497358D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1163CF40-4D70-4965-8229-B102D754ECD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33FD2F07-6CD0-4708-8D11-3BA0AEFD5271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "455BC769-5B19-4B91-844B-15B4FB2401E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "027639C1-CA74-4F02-98E3-9C93E71DD7CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F72EF9-60C6-48D0-A6D4-48FBFE24BBC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "581CCD85-F9BA-4AE0-8FCD-4118C13C1080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66250BC-0338-40E8-9E9F-706F2DA5E5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E48F04-9B55-4162-BB28-07FFD3D5194D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A727A1-219F-4B78-B490-0E47340B38F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E50CC66-0FC3-4825-B677-EBF34D6804B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A12922-9D6D-49E8-B9C6-DD74CD60FAFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "165E3D96-24EA-4F47-9692-30823C482BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E86ACD76-A1A6-4B99-A521-38C706AF2EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD455EBB-69AE-464A-93AA-13227FBD17E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82BAF85-06A9-4AEE-94D2-3CAF4607623E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*",
              "matchCriteriaId": "5C281835-B593-4824-A061-F042409D855C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAD995C-5D8D-4FE1-91BF-45FF893E7C0C",
              "versionEndExcluding": "12.0.92.2145v3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8000_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FEAC4F-B30C-44E2-B7A1-BA4367334008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8000t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC60BA46-EA85-45A4-8C9A-2FD49C2CD9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8020_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACC9389-15BB-4AE3-A3EF-9F36D0D54230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6325AFF1-8B27-408C-ADC3-E1FA826A2B9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D96F9D-50ED-47B4-9DC9-1C6807C70129",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "792B6DC2-0EE1-486E-B44A-F0971C12B1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9147C908-0B5E-4CC4-BFDA-FDC8219494A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CAE5F9-E9D5-4EE1-A02D-88707B118C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8120_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "071E5109-EDDC-47DA-85DA-84AE102386F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8121u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4801359-0950-4DED-A394-512737A263DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB32980-A87F-4AC6-9F1C-EA690582DECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E786A817-3F20-4DB9-BC86-EF0AEC3C131F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1100AAC2-5A94-4EF3-AB94-AB4B4085F109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17773338-62E3-4F05-86D1-7E3D157C78C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30904062-0998-4D93-8F61-36C41BCD11F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC25F057-A548-4E02-A464-8AE97B40A39D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F99AFDF6-1B9C-4F06-A827-F0C5052EA485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9C3DCA2-6087-4286-A84A-6091149083C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "813C2CF3-2370-4FC9-86F1-85FA6597EDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C71C3D-D137-4302-8B35-3A2AA08DD92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444C585D-8DAD-4D4E-99CB-23B38A2F2561",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2797768-C460-4901-99BE-148A7BADC020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CAAFA25-2328-4B29-8B4C-CAA34A3F07DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7001A74-CFF9-4CBB-A72B-E476C22ADF07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F1036B8-CB05-4DC5-AB07-ACCC6351B9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E3236A7-F174-4A47-90B3-7E0457CB3455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CF5BB43-9A54-4F8F-86EB-04B56135F69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE8EAB7-E619-4140-9FF2-F01DD57DD286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DB74AB-9D98-40B0-9715-EF934125C228",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7D6D69D-3EA5-4F5A-A64E-E561994BC7A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4ECE37-14C8-4035-9410-F66AF586934D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDC571E-D4F4-4837-9462-781B9085DDA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8420_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4D7564-46B9-4B1D-9B43-D539BBFE1AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8420t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "457FF494-B454-4DC7-A311-711C817905FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F4B23DC-BB43-4BF2-B96A-3A531EC603C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495C794A-3EB2-4C2B-8312-65C1C70EFFAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "382FEC53-468F-41B4-A639-5875F6C62DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCDBD532-C038-4C69-841F-DC4B09F5A99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4079D92-EF02-4003-B8B0-0EFD4DCAF8C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C5BEE28-D0F7-44F0-8B01-69EEF249FDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB2544C-BD41-4316-BDAD-30B4DDF785EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD242386-919B-4B0C-A7C9-D045C0977FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB634C16-35A0-43D5-98D7-B60E7097B732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8650k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13EB04A-F81C-4956-9324-6D972D4CC3D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD0F061-1664-4C0C-9207-8991C6F79F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8510y_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5164EB-8ED3-4FB3-8B90-F5FEAD490D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B60A1C2-D6E2-43B3-967C-746CDC2F96CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7600A08-3EA6-4A3D-8B5E-5F0C5E6A7E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "942B77AD-CEA4-4A9F-B748-155916A4917A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54606FA5-02CE-43C5-9153-FB1070E9DD15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8670_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "372261C6-7E3B-40DC-95EB-E4AC6926F3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8670t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC5EA2EC-2707-484F-AC5E-40BCAD09D7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8750hf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "881A1690-F94A-41E4-9F38-BAD170153B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB18769-9DDD-4321-B123-BFF81A02DA4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos productos Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi y Killer(TM) WiFi puede permitir que usuarios no autenticados habiliten potencialmente la Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2022-26047",
  "lastModified": "2024-11-21T06:53:21.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-11T16:15:12.333",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:55
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites de algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio por medio del acceso local."
    }
  ],
  "id": "CVE-2021-26254",
  "lastModified": "2024-11-21T05:55:59.323",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.320",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 05:51
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECE13C3-1EA0-4CE2-9FBC-0A5153E28220",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87BE1037-47C6-40EF-8C29-C6D8C7C4B48B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F42023-3426-4C13-A515-2DF3BA1A3CD1",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57ED602-14AC-48A1-9FFE-33C3592C863C",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66434F2B-0ED8-4364-9281-8A438B8D337D",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD700D79-A4B3-4C62-93BE-D13F016AA3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio por medio de acceso adyacente."
    }
  ],
  "id": "CVE-2021-23168",
  "lastModified": "2024-11-21T05:51:18.990",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.133",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un Uso Inapropiado del Marco de Comprobaci\u00f3n en el firmware de algunos Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0174",
  "lastModified": "2024-11-21T05:42:08.170",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.497",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:03
Summary
Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n inadecuada del tipo espec\u00edfico de entrada para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-32651",
  "lastModified": "2024-11-21T08:03:46.520",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:54.883",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1287"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-24 18:15
Modified
2024-11-21 05:20
Summary
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bluetooth:bluetooth_core_specification:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601A94F4-1A30-44F4-BEC5-88433C9EBC86",
              "versionEndIncluding": "5.2",
              "versionStartIncluding": "1.1b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax210_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA9E525-21D9-4B3E-85A2-63C7F01F7950",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F226D74C-4A48-4AC0-A565-A00D555E27D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AAB385A-5D49-4CED-92BD-8E790F29DCED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4649D446-130B-4B31-B9ED-BA7F9F7EEB8F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ax200_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BECECBE-C8FC-4669-A5DF-22EF61449B1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9903E2E-A670-40D4-8B9F-D2C0CFDBFC9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7154EAF0-2E61-4813-B443-C4556137EB4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9462_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D65359E2-1507-46F9-B259-7A75DF68EB34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E89EB0D-233A-486A-BDAE-F5726432CD7E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9461_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC15313E-27FB-470E-BB55-4A372B04864D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A11E55E8-5FA9-4ED7-AB61-03F22EE1759B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2795E42-D044-4D48-BCB2-61CC1A3471B1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08E2F3E-C4B5-4227-A88D-C50E209A12CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B0DBF3-63BB-40EF-9D46-E32D074D73DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_3168_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5199A11-AEAB-4110-A7F3-04239D35321F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5B2BCE-2D8A-440C-B866-76E035314022",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_7265_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7218FFF6-506E-45D7-9428-DDEACF4E5E1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F9F1CE7-8F14-4526-A857-7B954EC4BB6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_3165_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D141E7D-2CC4-47E7-8EBD-E4653FAA5EEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197A3DA1-B8EF-438F-B933-32253C43C8EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA43945-7F16-4A50-9E25-D91EE4A270F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2249BC-F119-471D-9D71-4690A65A1020",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7262E71-08D0-4F5E-8445-1FA0E2243340",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN."
    },
    {
      "lang": "es",
      "value": "Un emparejamiento de c\u00f3digo PIN BR/EDR heredado de Bluetooth en Bluetooth Core Specification versiones 1.0B hasta 5.2, puede permitir a un dispositivo cercano no autenticado falsificar el BD_ADDR del dispositivo peer para completar el emparejamiento sin conocer el PIN"
    }
  ],
  "id": "CVE-2020-26555",
  "lastModified": "2024-11-21T05:20:04.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-24T18:15:07.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://kb.cert.org/vuls/id/799380"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://kb.cert.org/vuls/id/799380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 08:07
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."
    }
  ],
  "id": "CVE-2023-34983",
  "lastModified": "2024-11-21T08:07:46.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:57.663",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware para Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio del acceso local"
    }
  ],
  "id": "CVE-2021-0161",
  "lastModified": "2024-11-21T05:42:06.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:13.983",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado en el firmware para Intel(R) PROSet/Wireless Wi-Fi en diversos sistemas operativos y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio del acceso local"
    }
  ],
  "id": "CVE-2021-0164",
  "lastModified": "2024-11-21T05:42:06.817",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.100",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-14 14:15
Modified
2024-11-21 07:50
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378",
              "versionEndExcluding": "3.1423.712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D",
              "versionEndExcluding": "22.240",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada incorrecta para algunos software Intel(R) PROSet/Wireless e Intel(R) Killer(TM) Wi-Fi anteriores a la versi\u00f3n 22.240 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2023-25951",
  "lastModified": "2024-11-21T07:50:30.337",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-14T14:15:44.040",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n Inapropiada del \u00cdndice, la Posici\u00f3n o el Desplazamiento Especificados en la Entrada en el software para algunos Intel(R) PROSet/Wireless Wi-Fi en varios sistemas operativos y algunos Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso adyacente"
    }
  ],
  "id": "CVE-2021-0183",
  "lastModified": "2024-11-21T05:42:09.230",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.737",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:15
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5A1F47-5FB4-40AD-8C41-905A438A8C2E",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A5DD09-188E-4772-BBFD-3DCC776F4D55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1881A00D-A0C6-45B8-9F5E-111122603991",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B60A55C-0969-43D4-A1A8-0E736DE89AFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3009BFD-D06E-4A68-B967-CD67C48B4CEC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F198C1B-28A8-4FB8-9266-333A6E465445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB84A83-95AA-4C7F-A765-D87EF43C9E08",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7990EEE4-427E-4003-8CED-296FCF878A6D",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC5EF3-444A-4439-9CC0-FE3428A298FB",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFADE0F-DBAB-40CE-8935-469FD343BD50",
              "versionEndExcluding": "3.1122.1105",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB10C03-EC71-4571-8D2B-CC68352200D8",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A07B29-35E8-4D50-B2AD-764766F43DAC",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23E76F8-AA82-47C0-8F3B-39123C04832F",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68DAD7E-8AAD-4FBF-AD3E-085F77E76B2B",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC46232-FBFF-4097-A9E5-6009B021D214",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2E583F-926A-4372-8C35-B00EDE9DC751",
              "versionEndExcluding": "22.120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos productos Intel(R) PROSet/Wireless WiFi y Killer(TM) WiFi puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de acceso local."
    }
  ],
  "id": "CVE-2021-37409",
  "lastModified": "2024-11-21T06:15:06.103",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:09.633",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 05:42
Summary
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DAD629-554A-4697-AEC1-1EB8EF2C2E39",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E784B9A-0FAD-4502-9E42-04290E921063",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B43CF20-A5EF-4640-8165-466F83AE9382",
              "versionEndExcluding": "11.8.90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B12E9-8B56-4C5B-8EC2-DA84E4D46737",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24DD1BCF-1C7F-4AF7-9EAE-F30BBF1B5D46",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CDFC0D-CB1A-49CE-BE14-11D413857914",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984A413C-5B9F-43E0-917E-70AD50A686EA",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9A6663-A9E6-4559-9949-DB9FD6A8A692",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B43E8-424B-420A-AA3C-86607F814D1A",
              "versionEndExcluding": "12.0.85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB0CC79C-2AD6-4B41-B1D7-4468D73410EB",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "481390E7-5C8E-4CBB-AF5B-56CAF256BD83",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF83AEF4-C642-42AC-9AFC-30EE6F2FCBCF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D05BB88-EDD3-462E-B529-2401B126CEA8",
              "versionEndExcluding": "14.1.60",
              "versionStartIncluding": "14.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30163EC-A1A1-46A0-BDF9-D2ED8A92C911",
              "versionEndExcluding": "15.0.35",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050ECFDF-3588-469F-A4D8-75D76045E22C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA94A1B-6742-4F60-B088-F7136DFF6DF3",
              "versionEndExcluding": "15.0.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A453BA8-6D12-46E2-ABDC-C67D11717B33",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9283B-6F33-459A-AE50-1B7451B4A84B",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4641E4A7-7A6C-4A76-A7A5-032AF02D1F78",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29722963-4CF6-4252-B69E-05EC2C8A3B24",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7638C7-6F12-4C10-8B6D-5F866950CA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "601CD809-4DCB-4D7D-93D8-87208DF3C7EF",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDDDE40-5D30-49AF-91C0-9A4FA7741201",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36CD654-5806-4472-9985-280C621E5095",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09145915-AFD1-4D5D-8178-8571C43A0BA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7879984-E422-4155-BC51-35A63A1DF68A",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1950BF4-323D-4A25-A645-3ED60ED6F3AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5022E2-047F-4747-B48D-E97A30B4B2EA",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28157739-A073-4B01-B308-470841344A2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5DE90A-99B1-485B-948B-8F806DEBA924",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B5EF48-BA3E-470C-9C68-12CEF8EFF045",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28121C9-61E1-4D5E-BAB1-CE0379F69F49",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2FEF5B6-E5EE-4210-89EF-FFBF3A214323",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D894F94E-6D23-4399-B39F-D7527139A728",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48863325-9857-4390-8D63-5FEDD723B719",
              "versionEndExcluding": "22.60",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BFF8901-DEFF-4D08-8692-571682DE8582",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57831022-35C2-4BE5-B4EB-70FC78BF3BC7",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA05D5D2-F6C1-4FBB-B334-73F30F108562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F117038E-01C9-4A8F-9D8A-6256B05F393C",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AA7ECF-2185-4947-8307-D4F2EFD1420A",
              "versionEndExcluding": "3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado en el software para Intel(R) PROSet/Wireless Wi-Fi y Killer(TM) Wi-Fi en Windows 10 y 11, puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de acceso local"
    }
  ],
  "id": "CVE-2021-0171",
  "lastModified": "2024-11-21T05:42:07.757",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-09T23:15:14.383",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2021-0163
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:18",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0163",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0163",
    "datePublished": "2022-02-09T22:04:18",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.033Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23223
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 19:05
Severity ?
Summary
Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:55.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper initialization for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23223",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T19:05:55.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-36351
Vulnerability from cvelistv5
Published
2023-08-11 02:36
Modified
2024-10-02 14:10
Summary
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:00:04.535Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-36351",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T14:06:11.743007Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:10:17.905Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-11T02:36:54.506Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-36351",
    "datePublished": "2023-08-11T02:36:54.506Z",
    "dateReserved": "2022-08-10T03:00:23.005Z",
    "dateUpdated": "2024-10-02T14:10:17.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0162
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0162",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0162",
    "datePublished": "2022-02-09T22:04:19",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.986Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28720
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-16 19:46
Summary
Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access..
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T13:43:23.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-28720",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:46:29.980512Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-16T19:46:41.176Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-665",
              "description": "Improper initialization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:55.300Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-28720",
    "datePublished": "2024-02-14T13:37:55.300Z",
    "dateReserved": "2023-06-15T03:00:04.950Z",
    "dateUpdated": "2024-08-16T19:46:41.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0171
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.007Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " information disclosure ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:23",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " information disclosure "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0171",
    "datePublished": "2022-02-09T22:04:23",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.007Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21140
Vulnerability from cvelistv5
Published
2022-08-18 19:43
Modified
2024-08-03 02:31
Severity ?
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:31:59.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:43:39",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2022-21140",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-21140",
    "datePublished": "2022-08-18T19:43:39",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T02:31:59.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0170
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.167Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " information disclosure ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:27",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " information disclosure "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0170",
    "datePublished": "2022-02-09T22:04:27",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.167Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0167
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.028Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0167",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0167",
    "datePublished": "2022-02-09T22:04:22",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-26586
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 19:55
Summary
Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:53:54.275Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-26586",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T19:55:06.161807Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T19:55:19.101Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-248",
              "description": "Uncaught exception",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:59.856Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-26586",
    "datePublished": "2024-02-14T13:37:59.856Z",
    "dateReserved": "2023-03-04T04:00:03.425Z",
    "dateUpdated": "2024-08-14T19:55:19.101Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0161
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0161",
    "datePublished": "2022-02-09T22:04:19",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23179
Vulnerability from cvelistv5
Published
2022-08-18 19:44
Modified
2024-08-03 19:05
Severity ?
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:55.561Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:44:27",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-23179",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23179",
    "datePublished": "2022-08-18T19:44:27",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T19:05:55.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0072
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:25
Severity ?
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.751Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " information disclosure ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:02",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0072",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " information disclosure "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0072",
    "datePublished": "2022-02-09T22:04:02",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:25:01.751Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23188
Vulnerability from cvelistv5
Published
2022-08-18 19:43
Modified
2024-08-03 19:05
Severity ?
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:53.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:43:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-23188",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23188",
    "datePublished": "2022-08-18T19:43:19",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T19:05:53.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-24587
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:19:08.605Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
          },
          {
            "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.fragattacks.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
          },
          {
            "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
          },
          {
            "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
          },
          {
            "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
        },
        {
          "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
        },
        {
          "url": "https://www.fragattacks.com"
        },
        {
          "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
        },
        {
          "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
        },
        {
          "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-24587",
    "datePublished": "2021-05-11T00:00:00",
    "dateReserved": "2020-08-21T00:00:00",
    "dateUpdated": "2024-08-04T15:19:08.605Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0174
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.925Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:28",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0174",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0174",
    "datePublished": "2022-02-09T22:04:28",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-26555
Vulnerability from cvelistv5
Published
2021-05-24 17:41
Modified
2024-08-04 15:56
Severity ?
Summary
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:56:04.577Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kb.cert.org/vuls/id/799380"
          },
          {
            "name": "FEDORA-2021-a35b44fd9f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-08T17:06:22",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kb.cert.org/vuls/id/799380"
        },
        {
          "name": "FEDORA-2021-a35b44fd9f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-26555",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/",
              "refsource": "MISC",
              "url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"
            },
            {
              "name": "https://kb.cert.org/vuls/id/799380",
              "refsource": "MISC",
              "url": "https://kb.cert.org/vuls/id/799380"
            },
            {
              "name": "FEDORA-2021-a35b44fd9f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-26555",
    "datePublished": "2021-05-24T17:41:15",
    "dateReserved": "2020-10-04T00:00:00",
    "dateUpdated": "2024-08-04T15:56:04.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0183
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.549Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:32",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0183",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0183",
    "datePublished": "2022-02-09T22:04:32",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-44545
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-04 04:25
Severity ?
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T04:25:16.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-44545",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-04T04:25:16.804Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0168
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.309Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:24",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0168",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0168",
    "datePublished": "2022-02-09T22:04:24",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.309Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-34983
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-07 20:11
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:17:04.229Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34983",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T20:11:21.146195Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:11:35.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:57.071Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-34983",
    "datePublished": "2024-02-14T13:37:57.071Z",
    "dateReserved": "2023-06-15T03:00:04.943Z",
    "dateUpdated": "2024-08-07T20:11:35.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-24588
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:19:08.467Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
          },
          {
            "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.fragattacks.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
          },
          {
            "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
          },
          {
            "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
          },
          {
            "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
        },
        {
          "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
        },
        {
          "url": "https://www.fragattacks.com"
        },
        {
          "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
        },
        {
          "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
        },
        {
          "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
        },
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-24588",
    "datePublished": "2021-05-11T00:00:00",
    "dateReserved": "2020-08-21T00:00:00",
    "dateUpdated": "2024-08-04T15:19:08.467Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-23168
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 19:05
Severity ?
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T19:05:53.894Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-23168",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T19:05:53.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32651
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 18:39
Summary
Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.297Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32651",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T18:38:37.285018Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T18:39:09.688Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-1287",
              "description": "Improper validation of specified type of input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:58.475Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32651",
    "datePublished": "2024-02-14T13:37:58.475Z",
    "dateReserved": "2023-06-15T03:00:04.926Z",
    "dateUpdated": "2024-08-14T18:39:09.688Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0066
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:25
Severity ?
Summary
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.765Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:03:59",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0066",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0066",
    "datePublished": "2022-02-09T22:04:00",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:25:01.765Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0164
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.215Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:20",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0164",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0164",
    "datePublished": "2022-02-09T22:04:20",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.215Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0179
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Use of Validation Framework in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.063Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Use of Validation Framework in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:30",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0179",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Use of Validation Framework in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0179",
    "datePublished": "2022-02-09T22:04:30",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.063Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0076
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:25
Severity ?
Summary
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.959Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:09",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0076",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0076",
    "datePublished": "2022-02-09T22:04:09",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:25:01.959Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0173
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.066Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:25",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0173",
    "datePublished": "2022-02-09T22:04:25",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.066Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-33847
Vulnerability from cvelistv5
Published
2022-08-18 19:43
Modified
2024-08-04 00:05
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:05:51.076Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:43:51",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-33847",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-33847",
    "datePublished": "2022-08-18T19:43:51",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-04T00:05:51.076Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0172
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.920Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:25",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0172",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0172",
    "datePublished": "2022-02-09T22:04:25",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.920Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0165
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:21",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0165",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0165",
    "datePublished": "2022-02-09T22:04:21",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28374
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-15 19:10
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:38:25.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-28374",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T19:10:21.336051Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T19:10:34.778Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:54.759Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-28374",
    "datePublished": "2024-02-14T13:37:54.759Z",
    "dateReserved": "2023-06-15T03:00:04.913Z",
    "dateUpdated": "2024-08-15T19:10:34.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-37409
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-04 01:16
Severity ?
Summary
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:16:04.147Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          },
          {
            "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-01T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        },
        {
          "name": "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-37409",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-04T01:16:04.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-26140
Vulnerability from cvelistv5
Published
2021-05-11 19:34
Modified
2024-08-04 15:49
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:49:07.137Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.fragattacks.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
          },
          {
            "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-28T14:11:58",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.fragattacks.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
        },
        {
          "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-26140",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
            },
            {
              "name": "https://www.fragattacks.com",
              "refsource": "MISC",
              "url": "https://www.fragattacks.com"
            },
            {
              "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md",
              "refsource": "MISC",
              "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
            },
            {
              "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
            },
            {
              "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63",
              "refsource": "MISC",
              "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-26140",
    "datePublished": "2021-05-11T19:34:42",
    "dateReserved": "2020-09-29T00:00:00",
    "dateUpdated": "2024-08-04T15:49:07.137Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32644
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 19:51
Summary
Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.573Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32644",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T19:51:22.903995Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T19:51:38.201Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-693",
              "description": "Protection mechanism failure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:59.194Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32644",
    "datePublished": "2024-02-14T13:37:59.194Z",
    "dateReserved": "2023-06-15T03:00:04.962Z",
    "dateUpdated": "2024-08-14T19:51:38.201Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0178
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.929Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:33",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0178",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0178",
    "datePublished": "2022-02-09T22:04:33",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.929Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0166
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.157Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0166",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0166",
    "datePublished": "2022-02-09T22:04:22",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33875
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-07 18:32
Summary
Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access..
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.404Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33875",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T18:19:25.535210Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:32:49.803Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access.."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:54.222Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-33875",
    "datePublished": "2024-02-14T13:37:54.222Z",
    "dateReserved": "2023-06-15T03:00:04.933Z",
    "dateUpdated": "2024-08-07T18:32:49.803Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-26139
Vulnerability from cvelistv5
Published
2021-05-11 19:37
Modified
2024-08-04 15:49
Severity ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:49:07.127Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.fragattacks.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
          },
          {
            "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
          },
          {
            "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
          },
          {
            "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-28T14:09:21",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.fragattacks.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
        },
        {
          "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
        },
        {
          "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-26139",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
            },
            {
              "name": "https://www.fragattacks.com",
              "refsource": "MISC",
              "url": "https://www.fragattacks.com"
            },
            {
              "name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md",
              "refsource": "MISC",
              "url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
            },
            {
              "name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
            },
            {
              "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
            },
            {
              "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
            },
            {
              "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63",
              "refsource": "MISC",
              "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-26139",
    "datePublished": "2021-05-11T19:37:55",
    "dateReserved": "2020-09-29T00:00:00",
    "dateUpdated": "2024-08-04T15:49:07.127Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0175
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.102Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:26",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0175",
    "datePublished": "2022-02-09T22:04:26",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.102Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26254
Vulnerability from cvelistv5
Published
2022-08-18 19:39
Modified
2024-08-03 20:19
Severity ?
Summary
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.386Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:39:46",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-26254",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-26254",
    "datePublished": "2022-08-18T19:39:46",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T20:19:20.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0169
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.611Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " escalation of privilege ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:27",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0169",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Uncontrolled Search Path Element in software for Intel(R) PROSet/Wireless Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " escalation of privilege "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0169",
    "datePublished": "2022-02-09T22:04:28",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.611Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26950
Vulnerability from cvelistv5
Published
2022-08-18 19:44
Modified
2024-08-03 20:33
Severity ?
Summary
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:33:41.305Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:44:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-26950",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-26950",
    "datePublished": "2022-08-18T19:44:19",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T20:33:41.305Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26047
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 04:56
Summary
Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T04:56:37.498Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T17:46:32.386Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00699.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-26047",
    "datePublished": "2022-11-11T15:49:13.792Z",
    "dateReserved": "2022-04-05T15:11:17.482Z",
    "dateUpdated": "2024-08-03T04:56:37.498Z",
    "requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-25951
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-14 18:46
Summary
Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:39:06.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "proset\\/wireless",
            "vendor": "intel",
            "versions": [
              {
                "lessThan": "22.240",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:intel:killer_wifi_software:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "killer_wifi_software",
            "vendor": "intel",
            "versions": [
              {
                "lessThan": "22.240",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-25951",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T18:40:19.267708Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T18:46:12.449Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:55.865Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-25951",
    "datePublished": "2024-02-14T13:37:55.865Z",
    "dateReserved": "2023-03-04T04:00:03.474Z",
    "dateUpdated": "2024-08-14T18:46:12.449Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32642
Vulnerability from cvelistv5
Published
2024-02-14 13:37
Modified
2024-08-16 19:46
Summary
Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.311Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32642",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:46:05.587325Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-16T19:46:15.081Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.240"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-1076",
              "description": "Insufficient adherence to expected conventions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-14T13:37:56.450Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-32642",
    "datePublished": "2024-02-14T13:37:56.450Z",
    "dateReserved": "2023-06-17T03:00:02.847Z",
    "dateUpdated": "2024-08-16T19:46:15.081Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0177
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:30",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0177",
    "datePublished": "2022-02-09T22:04:30",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.922Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0176
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 15:32
Severity ?
Summary
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:09.442Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": " denial of service ",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:04:29",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": " denial of service "
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0176",
    "datePublished": "2022-02-09T22:04:29",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:09.442Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26257
Vulnerability from cvelistv5
Published
2022-08-18 19:44
Modified
2024-08-03 20:19
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.390Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 22.120"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-18T19:44:07",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-26257",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 22.120"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00628.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-26257",
    "datePublished": "2022-08-18T19:44:07",
    "dateReserved": "2021-11-30T00:00:00",
    "dateUpdated": "2024-08-03T20:19:20.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}