Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-0172: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

0
Medium
VulnerabilityCVE-2021-0172cvecve-2021-0172
Published: Wed Feb 09 2022 (02/09/2022, 22:04:25 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:27:04 UTC

Technical Analysis

CVE-2021-0172 is a vulnerability identified in the firmware of certain Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as some Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker within adjacent wireless range to trigger a denial of service (DoS) condition. Specifically, the flaw can be exploited by sending crafted wireless frames or packets that the vulnerable firmware fails to properly validate, leading to a crash or hang of the Wi-Fi adapter or its driver, thereby disrupting network connectivity. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be within wireless range but does not require any privileges or user interaction. The impact is limited to availability, with no confidentiality or integrity compromise reported. No known exploits in the wild have been documented, and no official patch links were provided in the source information, although Intel typically releases firmware or driver updates to address such issues. This vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi adapters, which are common in consumer and enterprise laptops and desktops. The vulnerability's exploitation could cause temporary or prolonged loss of wireless connectivity, impacting business operations reliant on Wi-Fi networks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network availability. Enterprises and public sector entities that depend on Intel or Killer Wi-Fi adapters for wireless connectivity could experience service disruptions if targeted by an attacker within wireless range. This could impact productivity, especially in environments with critical wireless-dependent applications such as remote work, VoIP, or real-time data access. While the vulnerability does not compromise data confidentiality or integrity, denial of service attacks can degrade user experience and potentially disrupt business continuity. Organizations with dense office environments or public Wi-Fi hotspots may be more susceptible to such attacks. Additionally, sectors like finance, healthcare, and government, which often use Intel-based hardware extensively, could face operational challenges if attackers exploit this flaw. However, the requirement for physical proximity limits the attack scope to local adversaries or insiders rather than remote attackers.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Inventory and identify all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel’s official advisories and update firmware and drivers promptly once patches are released. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted wireless clients. 4) Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous or malformed wireless frames that could indicate exploitation attempts. 5) Educate IT staff and users about the risk of adjacent attackers and encourage physical security measures to restrict unauthorized presence near sensitive wireless infrastructure. 6) Where feasible, consider using wired connections for critical systems or deploying Wi-Fi adapters from alternative vendors not affected by this vulnerability until patches are applied. 7) Regularly audit and update wireless security configurations to minimize attack surface, including disabling unnecessary wireless features and enforcing strong encryption and authentication protocols.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb46b

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:27:04 PM

Last updated: 2/7/2026, 7:56:28 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats