CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

intel

wi-fi_6_ax201_firmware

24 known vulnerabilities · sorted by CVSS score

CVE-2019-11152
HIGH8.8

Memory corruption issues in Intel(R) WIFI Drivers before version 21.40 may allow a privileged user to potentially enable escalation of privilege, denial of service, and information disclosure via adjacent access.

intel / wi-fi_6_ax201_firmware+12
Adjacent
Published Nov 14, 2019
Page 1 of 2
CVE-2022-21139
HIGH8.8

Inadequate encryption strength for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

intel / wireless-ac_9560_firmware+8
Adjacent
Published Aug 18, 2022
CVE-2020-12321
HIGH8.8

Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

intel / dual_band_wireless-ac_3168_firmware+10
Adjacent
Published Nov 12, 2020
CVE-2021-33847
HIGH7.8

Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access.

intel / wi-fi_6_ax411_firmware+17
Local
Published Aug 18, 2022
CVE-2019-11151
HIGH7.8

Memory corruption issues in Intel(R) WIFI Drivers before version 21.40 may allow a privileged user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.

intel / wi-fi_6_ax201_firmware+12
Local
Published Nov 14, 2019
CVE-2021-37409
HIGH7.8

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.

intel / wireless-ac_9560_firmware+12
Local
Published Aug 18, 2022
CVE-2022-21197
HIGH7.5

Improper input validation for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via network access.

intel / wireless-ac_9560_firmware+8
Network
Published Aug 18, 2022
CVE-2022-21160
HIGH7.5

Improper buffer restrictions for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via network access.

intel / wireless-ac_9560_firmware+8
Network
Published Aug 18, 2022
CVE-2021-0105
HIGH7.3

Insecure inherited permissions in some Intel(R) ProSet/Wireless WiFi drivers may allow an authenticated user to potentially enable information disclosure and denial of service via adjacent access.

intel / ac_9461_firmware+4
Adjacent
Published Jun 9, 2021
CVE-2021-23179
HIGH7.1

Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow a privileged user to potentially enable information disclosure via local access.

intel / wi-fi_6_ax411_firmware+17
Local
Published Aug 18, 2022
CVE-2022-21212
MEDIUM6.5

Improper input validation for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

intel / wireless-ac_9560_firmware+8
Adjacent
Published Aug 18, 2022
CVE-2021-44545
MEDIUM6.5

Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

intel / killer_ac_1550_firmware+8
Adjacent
Published Aug 18, 2022
CVE-2020-12322
MEDIUM6.5

Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

intel / dual_band_wireless-ac_3168_firmware+10
Adjacent
Published Nov 12, 2020
CVE-2020-26140
MEDIUM6.5

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.

alfa / awus036h_firmware+203
Adjacent
Published May 11, 2021
CVE-2021-23168
MEDIUM6.5

Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

intel / wireless-ac_9560_firmware+17
Adjacent
Published Aug 18, 2022
CVE-2021-26254
MEDIUM5.5

Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable denial of service via local access.

intel / killer_ac_1550_firmware+8
Local
Published Aug 18, 2022
CVE-2021-26257
MEDIUM5.5

Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.

intel / wi-fi_6_ax411_firmware+17
Local
Published Aug 18, 2022
CVE-2022-21140
MEDIUM5.5

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable information disclosure via local access.

intel / wireless-ac_9560_firmware+17
Local
Published Aug 18, 2022
CVE-2021-26950
MEDIUM5.5

Out of bounds read in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable denial of service via local access.

intel / wi-fi_6_ax411_firmware+17
Local
Published Aug 18, 2022
CVE-2020-26139
MEDIUM5.3

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.

netbsd / netbsd+165
Adjacent
Published May 11, 2021