First published: Wed Nov 17 2021(Updated: )
Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Ax210 Firmware | <22.40 | |
Intel Ax210 | ||
Intel Ax201 Firmware | <22.40 | |
Intel Ax201 | ||
Intel Ax200 Firmware | <22.40 | |
Intel Ax200 | ||
Intel Ac 9560 Firmware | <22.40 | |
Intel Ac 9560 | ||
Intel Ac 9462 Firmware | <22.40 | |
Intel Ac 9462 | ||
Intel Ac 9461 Firmware | <22.40 | |
Intel Ac 9461 | ||
Intel 9260 Firmware | ||
Intel Ac 9260 Firmware | <22.40 | |
Intel Ac 9260 | ||
Intel Ac 8265 Firmware | <22.40 | |
Intel Ac 8265 | ||
Intel Ac 8260 Firmware | <22.40 | |
Intel Ac 8260 | ||
Intel Ac 3168 Firmware | <22.40 | |
Intel Ac 3168 | ||
Intel 7265 Firmware | <22.40 | |
Intel 7265 | ||
Intel Ac 3165 Firmware | <22.40 | |
Intel Ac 3165 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0071 is a vulnerability that involves improper input validation in the firmware for some Intel PROSet/Wireless WiFi in UEFI, which may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
The severity of CVE-2021-0071 is rated as high with a severity value of 8.8.
The affected software includes Intel Ax210 Firmware, Intel Ax201 Firmware, Intel Ax200 Firmware, Intel Ac 9560 Firmware, Intel Ac 9462 Firmware, Intel Ac 9461 Firmware, Intel 9260 Firmware, Intel Ac 9260 Firmware, Intel Ac 8265 Firmware, Intel Ac 8260 Firmware, Intel Ac 3168 Firmware, Intel 7265 Firmware, and Intel Ac 3165 Firmware.
An unauthenticated user can potentially enable escalation of privilege via adjacent access due to improper input validation in the firmware.
You can find more information about CVE-2021-0071 in the Intel Security Center Advisory at the following URL: [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html)