CVE-2021-0172: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI Analysis
Technical Summary
CVE-2021-0172 is a vulnerability identified in the firmware of certain Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as some Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker within adjacent wireless range to trigger a denial of service (DoS) condition. Specifically, the flaw can be exploited by sending crafted wireless frames or packets that the vulnerable firmware fails to properly validate, leading to a crash or hang of the Wi-Fi adapter or its driver, thereby disrupting network connectivity. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be within wireless range but does not require any privileges or user interaction. The impact is limited to availability, with no confidentiality or integrity compromise reported. No known exploits in the wild have been documented, and no official patch links were provided in the source information, although Intel typically releases firmware or driver updates to address such issues. This vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi adapters, which are common in consumer and enterprise laptops and desktops. The vulnerability's exploitation could cause temporary or prolonged loss of wireless connectivity, impacting business operations reliant on Wi-Fi networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network availability. Enterprises and public sector entities that depend on Intel or Killer Wi-Fi adapters for wireless connectivity could experience service disruptions if targeted by an attacker within wireless range. This could impact productivity, especially in environments with critical wireless-dependent applications such as remote work, VoIP, or real-time data access. While the vulnerability does not compromise data confidentiality or integrity, denial of service attacks can degrade user experience and potentially disrupt business continuity. Organizations with dense office environments or public Wi-Fi hotspots may be more susceptible to such attacks. Additionally, sectors like finance, healthcare, and government, which often use Intel-based hardware extensively, could face operational challenges if attackers exploit this flaw. However, the requirement for physical proximity limits the attack scope to local adversaries or insiders rather than remote attackers.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Inventory and identify all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel’s official advisories and update firmware and drivers promptly once patches are released. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted wireless clients. 4) Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous or malformed wireless frames that could indicate exploitation attempts. 5) Educate IT staff and users about the risk of adjacent attackers and encourage physical security measures to restrict unauthorized presence near sensitive wireless infrastructure. 6) Where feasible, consider using wired connections for critical systems or deploying Wi-Fi adapters from alternative vendors not affected by this vulnerability until patches are applied. 7) Regularly audit and update wireless security configurations to minimize attack surface, including disabling unnecessary wireless features and enforcing strong encryption and authentication protocols.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Finland
CVE-2021-0172: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11
Description
Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2021-0172 is a vulnerability identified in the firmware of certain Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as some Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker within adjacent wireless range to trigger a denial of service (DoS) condition. Specifically, the flaw can be exploited by sending crafted wireless frames or packets that the vulnerable firmware fails to properly validate, leading to a crash or hang of the Wi-Fi adapter or its driver, thereby disrupting network connectivity. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be within wireless range but does not require any privileges or user interaction. The impact is limited to availability, with no confidentiality or integrity compromise reported. No known exploits in the wild have been documented, and no official patch links were provided in the source information, although Intel typically releases firmware or driver updates to address such issues. This vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi adapters, which are common in consumer and enterprise laptops and desktops. The vulnerability's exploitation could cause temporary or prolonged loss of wireless connectivity, impacting business operations reliant on Wi-Fi networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network availability. Enterprises and public sector entities that depend on Intel or Killer Wi-Fi adapters for wireless connectivity could experience service disruptions if targeted by an attacker within wireless range. This could impact productivity, especially in environments with critical wireless-dependent applications such as remote work, VoIP, or real-time data access. While the vulnerability does not compromise data confidentiality or integrity, denial of service attacks can degrade user experience and potentially disrupt business continuity. Organizations with dense office environments or public Wi-Fi hotspots may be more susceptible to such attacks. Additionally, sectors like finance, healthcare, and government, which often use Intel-based hardware extensively, could face operational challenges if attackers exploit this flaw. However, the requirement for physical proximity limits the attack scope to local adversaries or insiders rather than remote attackers.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Inventory and identify all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel’s official advisories and update firmware and drivers promptly once patches are released. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted wireless clients. 4) Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous or malformed wireless frames that could indicate exploitation attempts. 5) Educate IT staff and users about the risk of adjacent attackers and encourage physical security measures to restrict unauthorized presence near sensitive wireless infrastructure. 6) Where feasible, consider using wired connections for critical systems or deploying Wi-Fi adapters from alternative vendors not affected by this vulnerability until patches are applied. 7) Regularly audit and update wireless security configurations to minimize attack surface, including disabling unnecessary wireless features and enforcing strong encryption and authentication protocols.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2020-10-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb46b
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 9:27:04 PM
Last updated: 8/15/2025, 2:55:39 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.