Skip to main content

CVE-2021-0172: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0172cvecve-2021-0172
Published: Wed Feb 09 2022 (02/09/2022, 22:04:25 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:27:04 UTC

Technical Analysis

CVE-2021-0172 is a vulnerability identified in the firmware of certain Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as some Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause of this vulnerability is improper input validation (classified under CWE-20), which allows an unauthenticated attacker within adjacent wireless range to trigger a denial of service (DoS) condition. Specifically, the flaw can be exploited by sending crafted wireless frames or packets that the vulnerable firmware fails to properly validate, leading to a crash or hang of the Wi-Fi adapter or its driver, thereby disrupting network connectivity. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be within wireless range but does not require any privileges or user interaction. The impact is limited to availability, with no confidentiality or integrity compromise reported. No known exploits in the wild have been documented, and no official patch links were provided in the source information, although Intel typically releases firmware or driver updates to address such issues. This vulnerability affects a broad range of devices using Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi adapters, which are common in consumer and enterprise laptops and desktops. The vulnerability's exploitation could cause temporary or prolonged loss of wireless connectivity, impacting business operations reliant on Wi-Fi networks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network availability. Enterprises and public sector entities that depend on Intel or Killer Wi-Fi adapters for wireless connectivity could experience service disruptions if targeted by an attacker within wireless range. This could impact productivity, especially in environments with critical wireless-dependent applications such as remote work, VoIP, or real-time data access. While the vulnerability does not compromise data confidentiality or integrity, denial of service attacks can degrade user experience and potentially disrupt business continuity. Organizations with dense office environments or public Wi-Fi hotspots may be more susceptible to such attacks. Additionally, sectors like finance, healthcare, and government, which often use Intel-based hardware extensively, could face operational challenges if attackers exploit this flaw. However, the requirement for physical proximity limits the attack scope to local adversaries or insiders rather than remote attackers.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Inventory and identify all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters, focusing on Windows 10 and 11 systems. 2) Monitor Intel’s official advisories and update firmware and drivers promptly once patches are released. 3) Implement wireless network segmentation and access controls to limit exposure of critical devices to untrusted wireless clients. 4) Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous or malformed wireless frames that could indicate exploitation attempts. 5) Educate IT staff and users about the risk of adjacent attackers and encourage physical security measures to restrict unauthorized presence near sensitive wireless infrastructure. 6) Where feasible, consider using wired connections for critical systems or deploying Wi-Fi adapters from alternative vendors not affected by this vulnerability until patches are applied. 7) Regularly audit and update wireless security configurations to minimize attack surface, including disabling unnecessary wireless features and enforcing strong encryption and authentication protocols.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb46b

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:27:04 PM

Last updated: 8/15/2025, 2:55:39 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats