Skip to main content

CVE-2021-0170: information disclosure in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0170cvecve-2021-0170
Published: Wed Feb 09 2022 (02/09/2022, 22:04:27 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:26:37 UTC

Technical Analysis

CVE-2021-0170 is a medium-severity vulnerability affecting Intel(R) PROSet/Wireless Wi-Fi firmware across multiple operating systems and certain Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The vulnerability involves an information disclosure flaw (CWE-200) that allows an authenticated local user to gain unauthorized access to sensitive information stored or processed by the affected Wi-Fi firmware. Specifically, the flaw arises from improper handling of sensitive data within the firmware, which can be exploited by a user with limited privileges (local access with low privileges) to extract confidential information without requiring user interaction. The vulnerability does not impact the integrity or availability of the system but compromises confidentiality. The CVSS 3.1 base score is 5.5, reflecting a medium severity due to the requirement for local access and privileges, but with a high impact on confidentiality. No known exploits in the wild have been reported to date. The affected products include Intel PROSet/Wireless Wi-Fi drivers and firmware used widely in laptops and desktops, as well as some Killer Wi-Fi adapters integrated into Windows 10 and 11 systems. The vulnerability was publicly disclosed in February 2022, with no direct vendor patch links provided in the source data, indicating that mitigation may require firmware or driver updates from device manufacturers or Intel. This vulnerability is particularly relevant for environments where multiple users share systems or where attackers may gain limited local access, as it could facilitate lateral movement or data leakage within an organization.

Potential Impact

For European organizations, the impact of CVE-2021-0170 centers on the potential exposure of sensitive information via compromised Wi-Fi firmware on affected devices. This could include leakage of credentials, configuration data, or other confidential information stored or handled by the wireless adapter firmware. In enterprise or government environments where Intel PROSet/Wireless and Killer Wi-Fi adapters are prevalent, this could lead to unauthorized disclosure of internal network details or user data, increasing the risk of further attacks such as privilege escalation or lateral movement. Although the vulnerability requires local authenticated access, insider threats or attackers who have gained limited user-level access could exploit this flaw to escalate their information gathering capabilities. The confidentiality breach could undermine compliance with European data protection regulations such as GDPR, especially if personal or sensitive data is exposed. Additionally, organizations with high-security requirements, such as financial institutions, critical infrastructure, or defense sectors, may face increased risk due to the strategic value of the leaked information. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in widely used Wi-Fi components necessitates proactive mitigation to prevent potential exploitation.

Mitigation Recommendations

1. Ensure all affected devices have the latest firmware and driver updates installed from Intel or device manufacturers, as these updates typically address known vulnerabilities in Wi-Fi firmware. 2. Implement strict access controls on endpoints to limit local user privileges and prevent unauthorized local access, reducing the risk of exploitation by low-privileged users. 3. Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity that could indicate attempts to exploit firmware vulnerabilities. 4. Conduct regular audits of devices using Intel PROSet/Wireless and Killer Wi-Fi adapters to identify and remediate outdated firmware versions. 5. For shared or multi-user systems, enforce user session isolation and restrict installation of unauthorized software to minimize the attack surface. 6. Educate users about the risks of local access vulnerabilities and enforce policies that limit physical and remote access to sensitive systems. 7. Coordinate with IT asset management to maintain an inventory of affected hardware and prioritize patching based on risk exposure. 8. If vendor patches are unavailable, consider temporary mitigations such as disabling affected Wi-Fi adapters or using alternative network interfaces until updates are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb459

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:26:37 PM

Last updated: 7/26/2025, 5:49:25 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats