{"containers":{"cna":{"affected":[{"product":"Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products","vendor":"n/a","versions":[{"status":"affected","version":"before version 22.100"}]}],"descriptions":[{"lang":"en","value":"Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access."}],"problemTypes":[{"descriptions":[{"description":" denial of service ","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-02-09T22:04:44.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2021-33139","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products","version":{"version_data":[{"version_value":"before version 22.100"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":" denial of service "}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html","refsource":"MISC","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T23:42:19.948Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-754","lang":"en","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.7,"attackVector":"ADJACENT_NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:21:19.798527Z","id":"CVE-2021-33139","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T16:47:49.805Z"}}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2021-33139","datePublished":"2022-02-09T22:04:44.000Z","dateReserved":"2021-05-18T00:00:00.000Z","dateUpdated":"2025-05-05T16:47:49.805Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}