CVE-2020-12321

Summary

CVECVE-2020-12321
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2020-11-12 18:15:00 UTC
Updated2021-07-21 11:39:00 UTC
DescriptionImproper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Intel Dual Band Wireless-ac 3165 - All All All
Hardware Intel Dual Band Wireless-ac 3165 - All All All
Operating System Intel Dual Band Wireless-ac 3165 Firmware All All All All
Operating System Intel Dual Band Wireless-ac 3165 Firmware All All All All
Hardware Intel Dual Band Wireless-ac 3168 - All All All
Hardware Intel Dual Band Wireless-ac 3168 - All All All
Operating System Intel Dual Band Wireless-ac 3168 Firmware All All All All
Operating System Intel Dual Band Wireless-ac 3168 Firmware All All All All
Hardware Intel Dual Band Wireless-ac 8260 - All All All
Hardware Intel Dual Band Wireless-ac 8260 - All All All
Operating System Intel Dual Band Wireless-ac 8260 Firmware All All All All
Operating System Intel Dual Band Wireless-ac 8260 Firmware All All All All
Hardware Intel Dual Band Wireless-ac 8265 - All All All
Hardware Intel Dual Band Wireless-ac 8265 - All All All
Operating System Intel Dual Band Wireless-ac 8265 Firmware All All All All
Operating System Intel Dual Band Wireless-ac 8265 Firmware All All All All
Hardware Intel Wi-fi 6 Ax200 - All All All
Hardware Intel Wi-fi 6 Ax200 - All All All
Operating System Intel Wi-fi 6 Ax200 Firmware All All All All
Operating System Intel Wi-fi 6 Ax200 Firmware All All All All
Hardware Intel Wi-fi 6 Ax201 - All All All
Hardware Intel Wi-fi 6 Ax201 - All All All
Operating System Intel Wi-fi 6 Ax201 Firmware All All All All
Operating System Intel Wi-fi 6 Ax201 Firmware All All All All
Hardware Intel Wireless-ac 9260 - All All All
Hardware Intel Wireless-ac 9260 - All All All
Operating System Intel Wireless-ac 9260 Firmware All All All All
Operating System Intel Wireless-ac 9260 Firmware All All All All
Hardware Intel Wireless-ac 9461 - All All All
Hardware Intel Wireless-ac 9461 - All All All
Operating System Intel Wireless-ac 9461 Firmware All All All All
Operating System Intel Wireless-ac 9461 Firmware All All All All
Hardware Intel Wireless-ac 9462 - All All All
Hardware Intel Wireless-ac 9462 - All All All
Operating System Intel Wireless-ac 9462 Firmware All All All All
Operating System Intel Wireless-ac 9462 Firmware All All All All
Hardware Intel Wireless-ac 9560 - All All All
Hardware Intel Wireless-ac 9560 - All All All
Operating System Intel Wireless-ac 9560 Firmware All All All All
Operating System Intel Wireless-ac 9560 Firmware All All All All
Hardware Intel Wireless 7265 Rev D - All All All
Hardware Intel Wireless 7265 Rev D - All All All
Operating System Intel Wireless 7265 Rev D Firmware All All All All
Operating System Intel Wireless 7265 Rev D Firmware All All All All

References

ReferenceSourceLinkTags
INTEL-SA-00403 MISC www.intel.com Patch, Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 374285 Intel Wireless Bluetooth Driver Privilege Escalation Vulnerability
  • 376883 Alibaba Cloud Linux Security Update for linux-firmware (ALINUX2-SA-2021:0006)
  • 672451 EulerOS Security Update for linux-firmware (EulerOS-SA-2022-2826)
  • 672465 EulerOS Security Update for linux-firmware (EulerOS-SA-2022-2851)
  • 730121 McAfee Web Gateway Multiple Vulnerabilities (WP-3484,WP-3744,WP-3745,WP-3746,WP-3747,WP-3793,WP-3800)
  • 750589 OpenSUSE Security Update for kernel-firmware (openSUSE-SU-2020:1962-1)
  • 750591 OpenSUSE Security Update for kernel-firmware (openSUSE-SU-2020:1960-1)
  • 940357 AlmaLinux Security Update for linux-firmware (ALSA-2020:5479)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report