Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Filtered by product Ac 8260
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-33115 1 Intel 13 Ac 3165, Ac 3168, Ac 7265 and 10 more 2024-02-28 5.8 MEDIUM 8.8 HIGH
Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2021-33155 1 Intel 32 Ac3168, Ac3168 Firmware, Ac 1550 and 29 more 2024-02-28 2.7 LOW 5.7 MEDIUM
Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.
CVE-2021-33139 1 Intel 32 Ac3168, Ac3168 Firmware, Ac 1550 and 29 more 2024-02-28 2.7 LOW 5.7 MEDIUM
Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0063 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2024-02-28 6.1 MEDIUM 6.5 MEDIUM
Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0079 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2024-02-28 6.1 MEDIUM 6.5 MEDIUM
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0064 1 Intel 24 7265, 7265 Firmware, Ac 3165 and 21 more 2024-02-28 4.6 MEDIUM 7.8 HIGH
Insecure inherited permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0075 1 Intel 31 7265, 7265 Firmware, 9260 Firmware and 28 more 2024-02-28 2.1 LOW 5.5 MEDIUM
Out-of-bounds write in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow a privileged user to potentially enable denial of service via local access.
CVE-2021-0078 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2024-02-28 6.8 MEDIUM 8.1 HIGH
Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
CVE-2021-0152 1 Intel 30 Ac1550, Ac1550 Firmware, Ac 3165 and 27 more 2024-02-28 2.1 LOW 5.5 MEDIUM
Improper verification of cryptographic signature in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
CVE-2021-0069 1 Intel 31 7265, 7265 Firmware, 9260 Firmware and 28 more 2024-02-28 3.3 LOW 6.5 MEDIUM
Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0065 1 Intel 25 7265, 7265 Firmware, 9260 Firmware and 22 more 2024-02-28 4.6 MEDIUM 7.8 HIGH
Incorrect default permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0071 1 Intel 25 7265, 7265 Firmware, 9260 Firmware and 22 more 2024-02-28 5.8 MEDIUM 8.8 HIGH
Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2021-0082 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2024-02-28 4.4 MEDIUM 7.8 HIGH
Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2021-0053 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2024-02-28 2.7 LOW 5.7 MEDIUM
Improper initialization in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an authenticated user to potentially enable information disclosure via adjacent access.
CVE-2021-0151 1 Intel 30 Ac1550, Ac1550 Firmware, Ac 3165 and 27 more 2024-02-28 4.6 MEDIUM 7.8 HIGH
Improper access control in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-26140 5 Alfa, Arista, Cisco and 2 more 388 Awus036h, Awus036h Firmware, C-100 and 385 more 2024-02-28 3.3 LOW 6.5 MEDIUM
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
CVE-2020-24587 6 Arista, Cisco, Debian and 3 more 332 C-100, C-100 Firmware, C-110 and 329 more 2024-02-28 1.8 LOW 2.6 LOW
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
CVE-2020-24588 8 Arista, Cisco, Debian and 5 more 350 C-100, C-100 Firmware, C-110 and 347 more 2024-02-28 2.9 LOW 3.5 LOW
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
CVE-2020-24586 5 Arista, Debian, Ieee and 2 more 44 C-200, C-200 Firmware, C-230 and 41 more 2024-02-28 2.9 LOW 3.5 LOW
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
CVE-2020-26555 3 Bluetooth, Fedoraproject, Intel 32 Bluetooth Core Specification, Fedora, Ac 3165 and 29 more 2024-02-28 4.8 MEDIUM 5.4 MEDIUM
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.