CVE-2021-0165: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI Analysis
Technical Summary
CVE-2021-0165 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as Killer(TM) Wi-Fi adapters specifically on Windows 10 and Windows 11 platforms. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker in adjacent network proximity to trigger a denial of service (DoS) condition. This means that an attacker does not require any prior authentication or user interaction to exploit the flaw. The attack vector is adjacent network access, implying that the attacker must be within wireless range of the target device. Exploitation of this vulnerability results in the disruption of wireless connectivity, effectively denying legitimate users access to network resources. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The impact is limited to availability, with no direct compromise of confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no official patches were referenced in the provided data, though Intel typically releases firmware updates to address such issues. The vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, which are widely deployed in consumer and enterprise laptops and desktops. Given the nature of the flaw, attackers could cause network outages or degrade wireless service quality, potentially impacting business operations that rely on stable Wi-Fi connectivity.
Potential Impact
For European organizations, the impact of CVE-2021-0165 can be significant in environments heavily dependent on wireless connectivity, such as corporate offices, educational institutions, and public service facilities. A successful denial of service attack could disrupt critical communications, delay business processes, and reduce productivity. In sectors like finance, healthcare, and government, where continuous network availability is crucial, such disruptions could have cascading effects on service delivery and operational continuity. Additionally, organizations with remote or hybrid work models relying on Wi-Fi connectivity for employee access could experience increased downtime and support costs. Although the vulnerability does not allow data theft or system compromise, the availability impact alone can cause reputational damage and financial losses. The requirement for adjacent access limits the attack scope to physical proximity, which somewhat reduces the risk of large-scale remote exploitation but does not eliminate targeted attacks in densely populated or accessible areas.
Mitigation Recommendations
To mitigate CVE-2021-0165, European organizations should prioritize the following actions: 1) Identify and inventory all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel's official security advisories and firmware update channels for patches addressing this vulnerability and apply them promptly once available. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted or guest wireless networks, reducing the risk of adjacent attackers. 4) Employ wireless intrusion detection and prevention systems (WIDS/WIPS) to detect anomalous or malicious wireless activity indicative of exploitation attempts. 5) Educate IT staff and end users about the importance of maintaining updated drivers and firmware for wireless adapters. 6) Where feasible, restrict physical access to sensitive areas to prevent attackers from gaining proximity to target devices. 7) Consider deploying network access control (NAC) solutions to enforce device compliance and restrict network access from vulnerable or unpatched devices. These measures collectively reduce the attack surface and improve resilience against denial of service attempts exploiting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Finland
CVE-2021-0165: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11
Description
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2021-0165 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as Killer(TM) Wi-Fi adapters specifically on Windows 10 and Windows 11 platforms. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker in adjacent network proximity to trigger a denial of service (DoS) condition. This means that an attacker does not require any prior authentication or user interaction to exploit the flaw. The attack vector is adjacent network access, implying that the attacker must be within wireless range of the target device. Exploitation of this vulnerability results in the disruption of wireless connectivity, effectively denying legitimate users access to network resources. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The impact is limited to availability, with no direct compromise of confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no official patches were referenced in the provided data, though Intel typically releases firmware updates to address such issues. The vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, which are widely deployed in consumer and enterprise laptops and desktops. Given the nature of the flaw, attackers could cause network outages or degrade wireless service quality, potentially impacting business operations that rely on stable Wi-Fi connectivity.
Potential Impact
For European organizations, the impact of CVE-2021-0165 can be significant in environments heavily dependent on wireless connectivity, such as corporate offices, educational institutions, and public service facilities. A successful denial of service attack could disrupt critical communications, delay business processes, and reduce productivity. In sectors like finance, healthcare, and government, where continuous network availability is crucial, such disruptions could have cascading effects on service delivery and operational continuity. Additionally, organizations with remote or hybrid work models relying on Wi-Fi connectivity for employee access could experience increased downtime and support costs. Although the vulnerability does not allow data theft or system compromise, the availability impact alone can cause reputational damage and financial losses. The requirement for adjacent access limits the attack scope to physical proximity, which somewhat reduces the risk of large-scale remote exploitation but does not eliminate targeted attacks in densely populated or accessible areas.
Mitigation Recommendations
To mitigate CVE-2021-0165, European organizations should prioritize the following actions: 1) Identify and inventory all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel's official security advisories and firmware update channels for patches addressing this vulnerability and apply them promptly once available. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted or guest wireless networks, reducing the risk of adjacent attackers. 4) Employ wireless intrusion detection and prevention systems (WIDS/WIPS) to detect anomalous or malicious wireless activity indicative of exploitation attempts. 5) Educate IT staff and end users about the importance of maintaining updated drivers and firmware for wireless adapters. 6) Where feasible, restrict physical access to sensitive areas to prevent attackers from gaining proximity to target devices. 7) Consider deploying network access control (NAC) solutions to enforce device compliance and restrict network access from vulnerable or unpatched devices. These measures collectively reduce the attack surface and improve resilience against denial of service attempts exploiting this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2020-10-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb41d
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 9:25:05 PM
Last updated: 2/7/2026, 8:22:09 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.