Skip to main content

CVE-2021-33130: information disclosure in Intel(R) RealSense(TM) ID Solution F450

Medium
VulnerabilityCVE-2021-33130cvecve-2021-33130
Published: Thu May 12 2022 (05/12/2022, 16:35:43 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) RealSense(TM) ID Solution F450

Description

Insecure default variable initialization of Intel(R) RealSense(TM) ID Solution F450 before version 2.6.0.74 may allow an unauthenticated user to potentially enable information disclosure via physical access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:28:08 UTC

Technical Analysis

CVE-2021-33130 is a medium-severity vulnerability affecting Intel(R) RealSense(TM) ID Solution F450 biometric authentication devices prior to version 2.6.0.74. The root cause is insecure default variable initialization, classified under CWE-1188, which leads to potential information disclosure. Specifically, the vulnerability allows an unauthenticated attacker with physical access to the device to potentially extract sensitive information. Since the attack vector requires physical access (Attack Vector: Physical), the risk is limited to scenarios where an adversary can interact directly with the hardware. The vulnerability does not require user interaction or authentication, increasing the risk in environments where devices are accessible. The impact is primarily confidentiality loss, with no direct effect on integrity or availability. The CVSS v3.1 base score is 4.6 (medium), reflecting the limited attack vector but high confidentiality impact. Intel has addressed this issue in version 2.6.0.74 and later, though no public exploit is known. The RealSense ID Solution F450 is used for biometric identification and authentication, often in security-sensitive environments, making any information disclosure a concern for privacy and security. The vulnerability highlights the importance of secure default configurations in embedded biometric systems to prevent leakage of sensitive biometric or authentication data.

Potential Impact

For European organizations, the impact of this vulnerability depends on the deployment scale of Intel RealSense ID Solution F450 devices. Organizations using these biometric devices for access control, identity verification, or secure authentication could face confidentiality breaches if an attacker gains physical access to the device. This could lead to exposure of biometric templates or authentication data, potentially enabling identity spoofing or unauthorized access elsewhere. Sectors such as finance, government, healthcare, and critical infrastructure in Europe that rely on biometric authentication are particularly at risk. The physical access requirement limits remote exploitation but insider threats or theft of devices could facilitate attacks. Additionally, compromised biometric data is difficult to revoke or change, increasing long-term risk. The vulnerability may also undermine trust in biometric security solutions, affecting compliance with GDPR and other data protection regulations concerning biometric data handling.

Mitigation Recommendations

European organizations should immediately verify the firmware version of Intel RealSense ID Solution F450 devices and upgrade to version 2.6.0.74 or later where the vulnerability is patched. Physical security controls must be strengthened to prevent unauthorized physical access to biometric devices, including secure mounting, surveillance, and restricted access areas. Implement device tamper detection and logging to detect and respond to physical tampering attempts. Where possible, complement biometric authentication with multi-factor authentication to reduce reliance on a single factor. Conduct regular audits of biometric data storage and access policies to ensure compliance with data protection laws. For devices that cannot be immediately updated, consider disabling or limiting their use in high-risk environments until patched. Finally, train staff on the risks of physical device compromise and enforce strict device handling procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbb4a

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:28:08 PM

Last updated: 8/14/2025, 6:28:28 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats