Vulnerabilities > Intel > AC 1550 Firmware

DATE CVE VULNERABILITY TITLE RISK
2022-02-09 CVE-2021-33110 Improper Input Validation vulnerability in Intel products
Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
low complexity
intel CWE-20
3.3
2022-02-09 CVE-2021-33113 Improper Input Validation vulnerability in Intel products
Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
low complexity
intel CWE-20
4.8
2022-02-09 CVE-2021-33114 Improper Input Validation vulnerability in Intel products
Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.
low complexity
intel CWE-20
2.7
2022-02-09 CVE-2021-33139 Improper Check for Unusual or Exceptional Conditions vulnerability in Intel products
Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.
low complexity
intel CWE-754
2.7
2022-02-09 CVE-2021-33155 Improper Input Validation vulnerability in Intel products
Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.
low complexity
intel CWE-20
2.7
2021-05-24 CVE-2020-26558 Improper Authentication vulnerability in multiple products
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session.
4.2
2021-05-11 CVE-2020-24586 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. 2.9