Skip to main content

CVE-2021-0076: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0076cvecve-2021-0076
Published: Wed Feb 09 2022 (02/09/2022, 22:04:09 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 20:57:48 UTC

Technical Analysis

CVE-2021-0076 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as certain Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause is an improper validation of specified index, position, or offset in input data, classified under CWE-20 (Improper Input Validation). This flaw allows a privileged local user to trigger a denial of service (DoS) condition by exploiting the firmware's failure to correctly validate input parameters. Specifically, the vulnerability can be exploited by a user with some level of privilege on the affected system to cause the Wi-Fi driver or firmware to crash or become unresponsive, leading to loss of wireless connectivity. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector requires local access (AV:L), low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild, and no patches are explicitly referenced in the provided information, though Intel typically releases firmware or driver updates to address such issues. The vulnerability affects multiple operating systems where Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi drivers are deployed, primarily Windows 10 and 11 for Killer Wi-Fi. This vulnerability is significant because Wi-Fi connectivity is critical for business operations, and disruption can impact productivity and network access. However, the requirement for local privileged access limits the attack surface primarily to insiders or attackers who have already compromised user privileges on the device.

Potential Impact

For European organizations, the primary impact of CVE-2021-0076 is the potential disruption of wireless network connectivity on affected devices. This can lead to temporary loss of access to corporate networks, cloud services, and internet resources, affecting employee productivity and operational continuity. Organizations with a large deployment of Intel PROSet/Wireless or Killer Wi-Fi adapters in Windows 10/11 environments are at higher risk. Critical sectors such as finance, healthcare, manufacturing, and government agencies that rely heavily on wireless connectivity for day-to-day operations could experience operational delays or interruptions. Although the vulnerability does not allow data theft or system compromise directly, denial of service conditions can be leveraged as part of multi-stage attacks or insider threats. Additionally, organizations with strict compliance requirements around availability and uptime (e.g., financial institutions under PSD2 or healthcare under GDPR mandates for service continuity) may face regulatory scrutiny if such disruptions occur. The medium severity rating and lack of remote exploitability reduce the likelihood of widespread attacks, but targeted attacks by insiders or malware with elevated privileges remain a concern.

Mitigation Recommendations

To mitigate CVE-2021-0076, European organizations should: 1) Ensure all affected systems have the latest firmware and driver updates from Intel and device manufacturers, as these typically contain patches for such vulnerabilities. 2) Implement strict privilege management policies to minimize the number of users with elevated privileges on endpoints, reducing the risk of local exploitation. 3) Employ endpoint protection solutions that monitor and restrict unauthorized local activities, including privilege escalation attempts. 4) Conduct regular audits of installed wireless drivers and firmware versions across the enterprise to identify and remediate outdated or vulnerable components. 5) Educate users and IT staff about the risks of local privilege abuse and enforce strong access controls on devices, including physical security measures to prevent unauthorized local access. 6) Consider network segmentation and use of wired connections for critical systems where feasible to reduce dependency on wireless connectivity. 7) Monitor system logs and network behavior for signs of instability or frequent wireless adapter resets that could indicate exploitation attempts. These steps go beyond generic advice by focusing on controlling local privilege access, maintaining up-to-date firmware, and monitoring for early signs of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb2a7

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 8:57:48 PM

Last updated: 7/28/2025, 9:38:14 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats