Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-0167: escalation of privilege in Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11

0
Medium
VulnerabilityCVE-2021-0167cvecve-2021-0167
Published: Wed Feb 09 2022 (02/09/2022, 22:04:22 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:25:44 UTC

Technical Analysis

CVE-2021-0167 is a vulnerability identified in the Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi software components used on Windows 10 and Windows 11 operating systems. The flaw arises from improper access control mechanisms within the software, which manage wireless network adapters. Specifically, this vulnerability allows a user who already has some level of privileged access (local privileged user) to escalate their privileges further on the affected system. The escalation of privilege occurs because the software does not adequately restrict certain operations or access to sensitive resources, enabling the attacker to gain higher-level permissions than intended. This vulnerability is local, meaning exploitation requires the attacker to have local access to the machine, and no user interaction is needed once the attacker has the required privileges. The CVSS v3.1 base score is 6.7, indicating a medium severity level. The vector string (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) shows that the attack vector is local, with low attack complexity, requiring high privileges but no user interaction, and impacts confidentiality, integrity, and availability with high severity. There are no known exploits in the wild, and no patch links are provided in the data, though it is likely that Intel or Microsoft have released updates or mitigations since the vulnerability was published in February 2022. This vulnerability is significant because it affects widely used wireless adapter management software on modern Windows platforms, potentially allowing an attacker with local privileged access to gain full control over the system, compromising system security and user data.

Potential Impact

For European organizations, the impact of CVE-2021-0167 can be substantial, especially in environments where Intel PROSet/Wireless Wi-Fi or Killer Wi-Fi software is deployed on Windows 10 or 11 endpoints. Since the vulnerability allows escalation of privilege from an already privileged user, it can be exploited by malicious insiders or attackers who have gained limited access to a system through other means. The elevated privileges could enable attackers to disable security controls, install persistent malware, exfiltrate sensitive data, or disrupt network connectivity. This is particularly critical for sectors with sensitive data such as finance, healthcare, government, and critical infrastructure. The compromise of wireless adapter management software could also impact network stability and security, potentially allowing attackers to manipulate wireless configurations or intercept network traffic. Given the widespread use of Windows 10 and 11 in European enterprises and the popularity of Intel wireless adapters, this vulnerability poses a realistic threat to confidentiality, integrity, and availability of systems. However, the requirement for local privileged access limits remote exploitation, reducing the risk of large-scale automated attacks but increasing the importance of internal security controls and endpoint protection.

Mitigation Recommendations

To mitigate CVE-2021-0167 effectively, European organizations should: 1) Ensure all systems using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi software are updated with the latest security patches from Intel and Microsoft. Even though patch links are not provided here, checking Intel’s security advisories and Microsoft Update Catalog is critical. 2) Restrict administrative and privileged access on endpoints to the minimum necessary, employing the principle of least privilege to reduce the pool of users who could exploit this vulnerability. 3) Implement robust endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation activities locally. 4) Use application whitelisting and device control policies to prevent unauthorized software or drivers from being installed or executed. 5) Conduct regular audits of user privileges and wireless adapter configurations to detect anomalies. 6) Educate IT staff and users about the risks of privilege escalation vulnerabilities and enforce strong physical and logical access controls to prevent unauthorized local access. 7) Consider network segmentation to limit the impact of compromised endpoints on critical network resources. These measures go beyond generic advice by focusing on controlling local privileged access and monitoring endpoint behavior specific to wireless adapter management software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb429

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:25:44 PM

Last updated: 2/7/2026, 2:45:00 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats