CVE-2021-26950: denial of service in Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
AI Analysis
Technical Summary
CVE-2021-26950 is a medium-severity vulnerability affecting Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products with firmware versions prior to 22.120. The flaw is an out-of-bounds read (CWE-125) in the firmware, which can be triggered by an authenticated local user. This vulnerability does not require user interaction beyond authentication and does not impact confidentiality or integrity but can lead to a denial of service (DoS) condition, causing the affected Bluetooth device or service to become unavailable. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H). No known exploits are reported in the wild, and no vendor patches are linked in the provided data, though it is expected that Intel has addressed this in firmware versions 22.120 and later. The vulnerability is significant in environments where Bluetooth connectivity is critical, as disruption can affect device communication and productivity. The flaw arises from improper bounds checking in firmware code, allowing an attacker with local authenticated access to cause the device to crash or become unresponsive, resulting in service interruption.
Potential Impact
For European organizations, the primary impact of this vulnerability is operational disruption due to denial of service on Bluetooth-enabled devices using affected Intel or Killer Bluetooth chipsets. This can affect laptops, desktops, and other wireless peripherals relying on Bluetooth for connectivity, including input devices, headsets, and IoT devices. In sectors such as finance, healthcare, manufacturing, and government, where secure and reliable wireless communication is vital, this DoS could interrupt workflows, reduce productivity, and potentially delay critical operations. Although the vulnerability does not expose sensitive data or allow privilege escalation, the loss of availability can indirectly impact business continuity and user experience. Organizations with large deployments of Intel Wireless or Killer Bluetooth hardware are at higher risk, especially if devices are used in environments where physical access is possible by low-privileged users or insiders. The lack of remote exploitability limits the threat to local scenarios, but insider threats or compromised endpoints could leverage this to cause disruption.
Mitigation Recommendations
European organizations should prioritize updating the firmware of Intel Wireless Bluetooth and Killer Bluetooth devices to version 22.120 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should consult Intel's official support channels or device manufacturers for firmware updates. Additionally, organizations should enforce strict local access controls to prevent unauthorized or low-privileged users from accessing systems with vulnerable Bluetooth firmware. Monitoring and restricting Bluetooth device usage in sensitive environments can reduce exposure. Implementing endpoint security solutions that detect anomalous Bluetooth activity or device crashes may help identify exploitation attempts. For critical systems, consider disabling Bluetooth if not required or using alternative communication methods until patches are applied. Regular asset inventories to identify devices with affected Bluetooth chipsets will aid in targeted remediation. Finally, educating users about the risks of local exploitation and maintaining physical security controls will further reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-26950: denial of service in Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products
Description
Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.
AI-Powered Analysis
Technical Analysis
CVE-2021-26950 is a medium-severity vulnerability affecting Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products with firmware versions prior to 22.120. The flaw is an out-of-bounds read (CWE-125) in the firmware, which can be triggered by an authenticated local user. This vulnerability does not require user interaction beyond authentication and does not impact confidentiality or integrity but can lead to a denial of service (DoS) condition, causing the affected Bluetooth device or service to become unavailable. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H). No known exploits are reported in the wild, and no vendor patches are linked in the provided data, though it is expected that Intel has addressed this in firmware versions 22.120 and later. The vulnerability is significant in environments where Bluetooth connectivity is critical, as disruption can affect device communication and productivity. The flaw arises from improper bounds checking in firmware code, allowing an attacker with local authenticated access to cause the device to crash or become unresponsive, resulting in service interruption.
Potential Impact
For European organizations, the primary impact of this vulnerability is operational disruption due to denial of service on Bluetooth-enabled devices using affected Intel or Killer Bluetooth chipsets. This can affect laptops, desktops, and other wireless peripherals relying on Bluetooth for connectivity, including input devices, headsets, and IoT devices. In sectors such as finance, healthcare, manufacturing, and government, where secure and reliable wireless communication is vital, this DoS could interrupt workflows, reduce productivity, and potentially delay critical operations. Although the vulnerability does not expose sensitive data or allow privilege escalation, the loss of availability can indirectly impact business continuity and user experience. Organizations with large deployments of Intel Wireless or Killer Bluetooth hardware are at higher risk, especially if devices are used in environments where physical access is possible by low-privileged users or insiders. The lack of remote exploitability limits the threat to local scenarios, but insider threats or compromised endpoints could leverage this to cause disruption.
Mitigation Recommendations
European organizations should prioritize updating the firmware of Intel Wireless Bluetooth and Killer Bluetooth devices to version 22.120 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should consult Intel's official support channels or device manufacturers for firmware updates. Additionally, organizations should enforce strict local access controls to prevent unauthorized or low-privileged users from accessing systems with vulnerable Bluetooth firmware. Monitoring and restricting Bluetooth device usage in sensitive environments can reduce exposure. Implementing endpoint security solutions that detect anomalous Bluetooth activity or device crashes may help identify exploitation attempts. For critical systems, consider disabling Bluetooth if not required or using alternative communication methods until patches are applied. Regular asset inventories to identify devices with affected Bluetooth chipsets will aid in targeted remediation. Finally, educating users about the risks of local exploitation and maintaining physical security controls will further reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2021-11-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdba7c
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:10:03 PM
Last updated: 8/8/2025, 5:11:41 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.