Skip to main content

CVE-2021-0174: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0174cvecve-2021-0174
Published: Wed Feb 09 2022 (02/09/2022, 22:04:28 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:27:35 UTC

Technical Analysis

CVE-2021-0174 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as certain Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The core issue stems from improper use of a validation framework within the firmware, which can be exploited by an unauthenticated attacker in proximity (adjacent access) to trigger a denial of service (DoS) condition. This vulnerability does not require user interaction or any privileges, making it accessible to attackers who are within wireless range of the targeted device. The flaw is categorized under CWE-20, indicating improper input validation, which in this case allows crafted wireless frames or packets to disrupt normal device operation. The impact is limited to availability, as confidentiality and integrity are not affected. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of adjacent network (wireless), low attack complexity, no privileges required, and no user interaction needed. No known exploits have been reported in the wild, and no official patches were referenced in the provided information, though Intel typically issues firmware or driver updates to address such issues. This vulnerability could cause affected Wi-Fi adapters to crash or become unresponsive, leading to network connectivity loss for the user until the device or driver is reset or updated.

Potential Impact

For European organizations, the primary impact of CVE-2021-0174 is the potential disruption of wireless network connectivity due to denial of service on affected Intel and Killer Wi-Fi adapters. This can affect business continuity, especially in environments heavily reliant on wireless networking for critical operations, such as offices, manufacturing floors, or remote work setups. The vulnerability could be exploited by attackers physically near the target (e.g., in public spaces, corporate campuses, or nearby buildings) to cause intermittent or sustained network outages. While the attack does not compromise data confidentiality or integrity, the loss of availability can hinder productivity, delay communications, and impact services dependent on wireless connectivity. Organizations with large deployments of Intel PROSet/Wireless or Killer Wi-Fi hardware may face operational challenges if attackers exploit this vulnerability. However, the requirement for physical proximity limits the attack scope compared to remote exploits. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for mitigation, especially in sensitive or high-availability environments.

Mitigation Recommendations

To mitigate CVE-2021-0174, European organizations should: 1) Inventory and identify all devices using Intel PROSet/Wireless and Killer Wi-Fi adapters on Windows 10 and 11 to understand exposure. 2) Monitor Intel's official security advisories and vendor driver updates for patches addressing this vulnerability and apply them promptly once available. 3) Implement wireless network segmentation and access controls to limit exposure to untrusted or unknown wireless clients within physical proximity. 4) Use wireless intrusion detection/prevention systems (WIDS/WIPS) to detect anomalous or malicious wireless frames that could trigger the DoS condition. 5) Educate IT staff to recognize symptoms of Wi-Fi adapter crashes and have procedures to quickly reset or replace affected devices. 6) Consider physical security measures to restrict attacker proximity in sensitive areas, such as shielding or controlled access zones. 7) Maintain up-to-date endpoint protection and network monitoring to detect unusual connectivity disruptions that may indicate exploitation attempts. These steps go beyond generic advice by focusing on physical proximity controls, active network monitoring, and rapid response to device failures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb480

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:27:35 PM

Last updated: 7/28/2025, 9:28:05 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats