Skip to main content

CVE-2021-0166: escalation of privilege in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0166cvecve-2021-0166
Published: Wed Feb 09 2022 (02/09/2022, 22:04:22 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:25:29 UTC

Technical Analysis

CVE-2021-0166 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as certain Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The vulnerability involves exposure of sensitive information to unauthorized actors, which can be leveraged by a privileged local user to escalate their privileges on the affected system. Specifically, the flaw allows a user who already has some level of local access (high privileges required) to exploit the firmware's improper handling of sensitive data, potentially gaining higher privileges than initially granted. This escalation could compromise confidentiality, integrity, and availability of the system. The CVSS v3.1 base score of 6.7 (medium severity) reflects that the attack vector requires local access (AV:L), low attack complexity (AC:L), and privileges (PR:H), with no user interaction (UI:N). The vulnerability impacts the confidentiality, integrity, and availability (all rated high) of the system. The CWE classification CWE-200 indicates exposure of sensitive information. Although no known exploits are reported in the wild, the vulnerability's presence in widely used Intel and Killer Wi-Fi adapters embedded in many devices makes it a significant concern. The lack of publicly available patches at the time of reporting underscores the need for vigilance and mitigation. This vulnerability is particularly relevant for environments where users have local access to systems with these Wi-Fi adapters, such as corporate laptops or desktops, and where privilege escalation can lead to broader network compromise or data breaches.

Potential Impact

For European organizations, the impact of CVE-2021-0166 can be substantial, especially in sectors relying heavily on Intel and Killer Wi-Fi adapters in their endpoint devices, such as finance, healthcare, government, and critical infrastructure. Privilege escalation vulnerabilities enable attackers or malicious insiders to gain unauthorized control over systems, potentially leading to data exfiltration, disruption of services, or lateral movement within networks. Given the widespread deployment of Intel Wi-Fi adapters in laptops and desktops, many European enterprises could be affected. The exposure of sensitive information combined with privilege escalation could facilitate advanced persistent threats (APTs) or insider attacks, undermining compliance with stringent European data protection regulations like GDPR. Additionally, organizations with remote or hybrid workforces using Windows 10 or 11 devices with these adapters may face increased risk, as local access could be obtained through compromised endpoints. The vulnerability's medium severity suggests that while exploitation requires local privileged access, the consequences of successful exploitation are severe, potentially impacting confidentiality, integrity, and availability of critical systems.

Mitigation Recommendations

To mitigate CVE-2021-0166, European organizations should take the following specific steps beyond generic advice: 1) Inventory and identify all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 endpoints. 2) Monitor vendor advisories closely for firmware and driver updates addressing this vulnerability and apply patches promptly once available. 3) Restrict local administrative privileges rigorously, employing the principle of least privilege to minimize the number of users with high-level access. 4) Implement endpoint detection and response (EDR) solutions capable of detecting unusual privilege escalation attempts or firmware manipulation. 5) Enforce strong physical security controls to prevent unauthorized local access to devices, especially in shared or public environments. 6) Conduct regular security awareness training emphasizing the risks of local privilege escalation and the importance of safeguarding credentials and devices. 7) Use application whitelisting and device control policies to limit the execution of unauthorized code or firmware modifications. 8) Employ network segmentation to limit the impact of compromised endpoints and prevent lateral movement. These targeted measures will reduce the likelihood of exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb421

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:25:29 PM

Last updated: 8/14/2025, 2:59:48 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats