Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Filtered by product Ac 9260 Firmware
Total 30 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24586 5 Arista, Debian, Ieee and 2 more 44 C-200, C-200 Firmware, C-230 and 41 more 2024-02-28 2.9 LOW 3.5 LOW
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
CVE-2020-26555 3 Bluetooth, Fedoraproject, Intel 32 Bluetooth Core Specification, Fedora, Ac 3165 and 29 more 2024-02-28 4.8 MEDIUM 5.4 MEDIUM
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
CVE-2020-26558 5 Bluetooth, Debian, Fedoraproject and 2 more 34 Bluetooth Core Specification, Debian Linux, Fedora and 31 more 2024-02-28 4.3 MEDIUM 4.2 MEDIUM
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2020-26139 5 Arista, Cisco, Debian and 2 more 330 C-100, C-100 Firmware, C-110 and 327 more 2024-02-28 2.9 LOW 5.3 MEDIUM
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
CVE-2020-0569 5 Canonical, Debian, Intel and 2 more 26 Ubuntu Linux, Debian Linux, 7265 and 23 more 2024-02-28 2.7 LOW 5.7 MEDIUM
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2020-0555 1 Intel 22 Ac 3165, Ac 3165 Firmware, Ac 3168 and 19 more 2024-02-28 4.6 MEDIUM 7.8 HIGH
Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-0554 2 Intel, Microsoft 14 Ac 3165 Firmware, Ac 3168 Firmware, Ac 7265 Firmware and 11 more 2024-02-28 3.7 LOW 7.0 HIGH
Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.
CVE-2020-0553 2 Intel, Microsoft 12 Ac 3165 Firmware, Ac 3168 Firmware, Ac 7265 Firmware and 9 more 2024-02-28 2.1 LOW 4.4 MEDIUM
Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.
CVE-2020-0559 2 Intel, Microsoft 78 Ac 3165 Firmware, Ac 3168 Firmware, Ac 7265 Firmware and 75 more 2024-02-28 4.6 MEDIUM 7.8 HIGH
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-14620 1 Intel 22 Ac 3165, Ac 3165 Firmware, Ac 3168 and 19 more 2024-02-28 3.3 LOW 6.5 MEDIUM
Insufficient control flow management for some Intel(R) Wireless Bluetooth(R) products may allow an unprivileged user to potentially enable denial of service via adjacent access.