Skip to main content

CVE-2021-0171: information disclosure in Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0171cvecve-2021-0171
Published: Wed Feb 09 2022 (02/09/2022, 22:04:23 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:26:50 UTC

Technical Analysis

CVE-2021-0171 is a medium-severity vulnerability affecting Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi software components running on Windows 10 and Windows 11 platforms. The vulnerability arises due to improper access control mechanisms within the software, which may allow an authenticated local user to disclose sensitive information. Specifically, an attacker with legitimate access to the affected system could exploit this flaw to gain unauthorized access to information that should otherwise be protected. The vulnerability does not require user interaction beyond authentication and does not impact system integrity or availability, but it does compromise confidentiality. The CVSS 3.1 base score is 5.5, reflecting a local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high confidentiality impact (C:H) with no impact on integrity (I:N) or availability (A:N). There are no known exploits in the wild, and no public patches referenced in the provided data, though it is likely that Intel and Microsoft have addressed this in subsequent updates. The vulnerability affects Windows 10 and 11 systems that have Intel PROSet/Wireless Wi-Fi or Killer Wi-Fi software installed, which are commonly used for managing wireless network connections on devices with Intel wireless adapters. The flaw could be leveraged by malicious insiders or attackers who have gained limited access to a system to extract sensitive information, potentially including credentials or configuration data related to wireless networking.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality of sensitive wireless network information on affected endpoints. Since the flaw requires local authenticated access, the threat is more relevant in environments where endpoint security is weak or where insider threats exist. Disclosure of wireless configuration or credential data could facilitate lateral movement within corporate networks or enable further attacks on wireless infrastructure. Organizations with large deployments of Intel wireless adapters and associated management software on Windows 10 or 11 devices—such as enterprises, government agencies, and critical infrastructure operators—may be at risk. The impact is heightened in sectors where wireless network security is critical, including finance, healthcare, and public administration. However, the lack of known exploits and the requirement for local authentication reduce the immediacy of the threat. Still, the vulnerability could be exploited in targeted attacks or by malware that gains initial foothold on a device. The potential for information disclosure could lead to compromise of network security posture and facilitate subsequent attacks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should ensure that all Windows 10 and Windows 11 systems with Intel PROSet/Wireless Wi-Fi or Killer Wi-Fi software are updated to the latest versions provided by Intel and Microsoft, as patches or updated software versions likely address this issue. Organizations should audit their endpoint inventory to identify devices with affected wireless management software and prioritize patching accordingly. Implement strict access controls and endpoint security measures to prevent unauthorized local access, including enforcing strong authentication, limiting user privileges, and employing endpoint detection and response (EDR) solutions to detect suspicious activity. Network segmentation can limit the impact of any potential compromise. Additionally, organizations should monitor for unusual access patterns or attempts to extract wireless configuration data. User training to recognize insider threat indicators and enforcing policies for device usage can further reduce risk. Finally, consider disabling or uninstalling Intel PROSet/Killer Wi-Fi software if it is not essential, or replacing it with alternative wireless management tools that do not have this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb463

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:26:50 PM

Last updated: 7/25/2025, 8:03:02 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats