DescriptionInsufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firmware-nonfree (PTS)stretch/non-free20161130-5undetermined
stretch/non-free (security)20190114-2~deb9u1undetermined
sid/non-free, bookworm/non-free20210818-1undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[buster] - firmware-nonfree <no-dsa> (non-free not supported)
[stretch] - firmware-nonfree <no-dsa> (Minor Issue, May be considered if some major issue appear)
Fixed firmware blobs:
ibt-18-16-1.sfi: FW Build: REL17064 Release Version:
Not shipped in Debian: Wi-Fi 6 AX200, Wireless-AC 9560, Wireless-AC 9462, Wireless-AC 9461, Dual Band Wireless-AC 3165
Intel seems to have missed the update for ibt-12-16.sfi, last update from May 2019
Intel seems to have missed the update for ibt-11-5.sfi, last update from Jan 2019
There's no conclusive information which allows to track these, until something
gets confirmed by Intel, track as <undetermined>

Search for package or bug name: Reporting problems