Skip to main content

CVE-2021-0165: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0165cvecve-2021-0165
Published: Wed Feb 09 2022 (02/09/2022, 22:04:21 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:25:05 UTC

Technical Analysis

CVE-2021-0165 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as Killer(TM) Wi-Fi adapters specifically on Windows 10 and Windows 11 platforms. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker in adjacent network proximity to trigger a denial of service (DoS) condition. This means that an attacker does not require any prior authentication or user interaction to exploit the flaw. The attack vector is adjacent network access, implying that the attacker must be within wireless range of the target device. Exploitation of this vulnerability results in the disruption of wireless connectivity, effectively denying legitimate users access to network resources. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The impact is limited to availability, with no direct compromise of confidentiality or integrity. There are no known exploits in the wild at the time of publication, and no official patches were referenced in the provided data, though Intel typically releases firmware updates to address such issues. The vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, which are widely deployed in consumer and enterprise laptops and desktops. Given the nature of the flaw, attackers could cause network outages or degrade wireless service quality, potentially impacting business operations that rely on stable Wi-Fi connectivity.

Potential Impact

For European organizations, the impact of CVE-2021-0165 can be significant in environments heavily dependent on wireless connectivity, such as corporate offices, educational institutions, and public service facilities. A successful denial of service attack could disrupt critical communications, delay business processes, and reduce productivity. In sectors like finance, healthcare, and government, where continuous network availability is crucial, such disruptions could have cascading effects on service delivery and operational continuity. Additionally, organizations with remote or hybrid work models relying on Wi-Fi connectivity for employee access could experience increased downtime and support costs. Although the vulnerability does not allow data theft or system compromise, the availability impact alone can cause reputational damage and financial losses. The requirement for adjacent access limits the attack scope to physical proximity, which somewhat reduces the risk of large-scale remote exploitation but does not eliminate targeted attacks in densely populated or accessible areas.

Mitigation Recommendations

To mitigate CVE-2021-0165, European organizations should prioritize the following actions: 1) Identify and inventory all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel's official security advisories and firmware update channels for patches addressing this vulnerability and apply them promptly once available. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted or guest wireless networks, reducing the risk of adjacent attackers. 4) Employ wireless intrusion detection and prevention systems (WIDS/WIPS) to detect anomalous or malicious wireless activity indicative of exploitation attempts. 5) Educate IT staff and end users about the importance of maintaining updated drivers and firmware for wireless adapters. 6) Where feasible, restrict physical access to sensitive areas to prevent attackers from gaining proximity to target devices. 7) Consider deploying network access control (NAC) solutions to enforce device compliance and restrict network access from vulnerable or unpatched devices. These measures collectively reduce the attack surface and improve resilience against denial of service attempts exploiting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb41d

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:25:05 PM

Last updated: 7/26/2025, 10:12:38 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats