Skip to main content

CVE-2021-26950: denial of service in Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products

Medium
VulnerabilityCVE-2021-26950cvecve-2021-26950
Published: Thu Aug 18 2022 (08/18/2022, 19:44:19 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products

Description

Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:10:03 UTC

Technical Analysis

CVE-2021-26950 is a medium-severity vulnerability affecting Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products with firmware versions prior to 22.120. The flaw is an out-of-bounds read (CWE-125) in the firmware, which can be triggered by an authenticated local user. This vulnerability does not require user interaction beyond authentication and does not impact confidentiality or integrity but can lead to a denial of service (DoS) condition, causing the affected Bluetooth device or service to become unavailable. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H). No known exploits are reported in the wild, and no vendor patches are linked in the provided data, though it is expected that Intel has addressed this in firmware versions 22.120 and later. The vulnerability is significant in environments where Bluetooth connectivity is critical, as disruption can affect device communication and productivity. The flaw arises from improper bounds checking in firmware code, allowing an attacker with local authenticated access to cause the device to crash or become unresponsive, resulting in service interruption.

Potential Impact

For European organizations, the primary impact of this vulnerability is operational disruption due to denial of service on Bluetooth-enabled devices using affected Intel or Killer Bluetooth chipsets. This can affect laptops, desktops, and other wireless peripherals relying on Bluetooth for connectivity, including input devices, headsets, and IoT devices. In sectors such as finance, healthcare, manufacturing, and government, where secure and reliable wireless communication is vital, this DoS could interrupt workflows, reduce productivity, and potentially delay critical operations. Although the vulnerability does not expose sensitive data or allow privilege escalation, the loss of availability can indirectly impact business continuity and user experience. Organizations with large deployments of Intel Wireless or Killer Bluetooth hardware are at higher risk, especially if devices are used in environments where physical access is possible by low-privileged users or insiders. The lack of remote exploitability limits the threat to local scenarios, but insider threats or compromised endpoints could leverage this to cause disruption.

Mitigation Recommendations

European organizations should prioritize updating the firmware of Intel Wireless Bluetooth and Killer Bluetooth devices to version 22.120 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should consult Intel's official support channels or device manufacturers for firmware updates. Additionally, organizations should enforce strict local access controls to prevent unauthorized or low-privileged users from accessing systems with vulnerable Bluetooth firmware. Monitoring and restricting Bluetooth device usage in sensitive environments can reduce exposure. Implementing endpoint security solutions that detect anomalous Bluetooth activity or device crashes may help identify exploitation attempts. For critical systems, consider disabling Bluetooth if not required or using alternative communication methods until patches are applied. Regular asset inventories to identify devices with affected Bluetooth chipsets will aid in targeted remediation. Finally, educating users about the risks of local exploitation and maintaining physical security controls will further reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-11-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdba7c

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:10:03 PM

Last updated: 8/8/2025, 5:11:41 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats