CVE-2021-26950: denial of service in Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2021-26950 is a medium-severity vulnerability affecting Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products with firmware versions prior to 22.120. The flaw is an out-of-bounds read (CWE-125) in the firmware, which can be triggered by an authenticated local user. This vulnerability does not require user interaction beyond authentication and does not impact confidentiality or integrity but can lead to a denial of service (DoS) condition, causing the affected Bluetooth device or service to become unavailable. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H). No known exploits are reported in the wild, and no vendor patches are linked in the provided data, though it is expected that Intel has addressed this in firmware versions 22.120 and later. The vulnerability is significant in environments where Bluetooth connectivity is critical, as disruption can affect device communication and productivity. The flaw arises from improper bounds checking in firmware code, allowing an attacker with local authenticated access to cause the device to crash or become unresponsive, resulting in service interruption.
Potential Impact
For European organizations, the primary impact of this vulnerability is operational disruption due to denial of service on Bluetooth-enabled devices using affected Intel or Killer Bluetooth chipsets. This can affect laptops, desktops, and other wireless peripherals relying on Bluetooth for connectivity, including input devices, headsets, and IoT devices. In sectors such as finance, healthcare, manufacturing, and government, where secure and reliable wireless communication is vital, this DoS could interrupt workflows, reduce productivity, and potentially delay critical operations. Although the vulnerability does not expose sensitive data or allow privilege escalation, the loss of availability can indirectly impact business continuity and user experience. Organizations with large deployments of Intel Wireless or Killer Bluetooth hardware are at higher risk, especially if devices are used in environments where physical access is possible by low-privileged users or insiders. The lack of remote exploitability limits the threat to local scenarios, but insider threats or compromised endpoints could leverage this to cause disruption.
Mitigation Recommendations
European organizations should prioritize updating the firmware of Intel Wireless Bluetooth and Killer Bluetooth devices to version 22.120 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should consult Intel's official support channels or device manufacturers for firmware updates. Additionally, organizations should enforce strict local access controls to prevent unauthorized or low-privileged users from accessing systems with vulnerable Bluetooth firmware. Monitoring and restricting Bluetooth device usage in sensitive environments can reduce exposure. Implementing endpoint security solutions that detect anomalous Bluetooth activity or device crashes may help identify exploitation attempts. For critical systems, consider disabling Bluetooth if not required or using alternative communication methods until patches are applied. Regular asset inventories to identify devices with affected Bluetooth chipsets will aid in targeted remediation. Finally, educating users about the risks of local exploitation and maintaining physical security controls will further reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-26950: denial of service in Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
Description
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2021-26950 is a medium-severity vulnerability affecting Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products with firmware versions prior to 22.120. The flaw is an out-of-bounds read (CWE-125) in the firmware, which can be triggered by an authenticated local user. This vulnerability does not require user interaction beyond authentication and does not impact confidentiality or integrity but can lead to a denial of service (DoS) condition, causing the affected Bluetooth device or service to become unavailable. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H). No known exploits are reported in the wild, and no vendor patches are linked in the provided data, though it is expected that Intel has addressed this in firmware versions 22.120 and later. The vulnerability is significant in environments where Bluetooth connectivity is critical, as disruption can affect device communication and productivity. The flaw arises from improper bounds checking in firmware code, allowing an attacker with local authenticated access to cause the device to crash or become unresponsive, resulting in service interruption.
Potential Impact
For European organizations, the primary impact of this vulnerability is operational disruption due to denial of service on Bluetooth-enabled devices using affected Intel or Killer Bluetooth chipsets. This can affect laptops, desktops, and other wireless peripherals relying on Bluetooth for connectivity, including input devices, headsets, and IoT devices. In sectors such as finance, healthcare, manufacturing, and government, where secure and reliable wireless communication is vital, this DoS could interrupt workflows, reduce productivity, and potentially delay critical operations. Although the vulnerability does not expose sensitive data or allow privilege escalation, the loss of availability can indirectly impact business continuity and user experience. Organizations with large deployments of Intel Wireless or Killer Bluetooth hardware are at higher risk, especially if devices are used in environments where physical access is possible by low-privileged users or insiders. The lack of remote exploitability limits the threat to local scenarios, but insider threats or compromised endpoints could leverage this to cause disruption.
Mitigation Recommendations
European organizations should prioritize updating the firmware of Intel Wireless Bluetooth and Killer Bluetooth devices to version 22.120 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should consult Intel's official support channels or device manufacturers for firmware updates. Additionally, organizations should enforce strict local access controls to prevent unauthorized or low-privileged users from accessing systems with vulnerable Bluetooth firmware. Monitoring and restricting Bluetooth device usage in sensitive environments can reduce exposure. Implementing endpoint security solutions that detect anomalous Bluetooth activity or device crashes may help identify exploitation attempts. For critical systems, consider disabling Bluetooth if not required or using alternative communication methods until patches are applied. Regular asset inventories to identify devices with affected Bluetooth chipsets will aid in targeted remediation. Finally, educating users about the risks of local exploitation and maintaining physical security controls will further reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2021-11-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdba7c
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:10:03 PM
Last updated: 10/16/2025, 12:51:18 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.