Skip to main content

CVE-2021-0175: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0175cvecve-2021-0175
Published: Wed Feb 09 2022 (02/09/2022, 22:04:26 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:28:03 UTC

Technical Analysis

CVE-2021-0175 is a vulnerability identified in the firmware of Intel(R) PROSet/Wireless Wi-Fi adapters across multiple operating systems, as well as certain Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause is improper validation of specified index, position, or offset in input data, classified under CWE-20 (Improper Input Validation). This flaw allows an unauthenticated attacker with adjacent network access—meaning they must be within wireless range—to potentially trigger a denial of service (DoS) condition. The DoS impact arises from the device firmware mishandling crafted input, which can cause the Wi-Fi adapter to crash or become unresponsive, disrupting network connectivity. The vulnerability does not affect confidentiality or integrity directly, nor does it require user interaction or privileges, but it does impact availability of wireless network services. The CVSS v3.1 base score is 6.5 (medium severity), with vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires adjacent network access but no privileges or user interaction, and results in high impact on availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, though Intel typically addresses such issues in firmware or driver updates. This vulnerability is significant because Wi-Fi adapters are critical for network connectivity, and disruption can affect business operations, especially in environments relying heavily on wireless communication.

Potential Impact

For European organizations, the impact of CVE-2021-0175 primarily concerns availability of wireless network services. Enterprises, public institutions, and critical infrastructure entities that depend on Intel PROSet/Wireless or Killer Wi-Fi adapters in Windows 10/11 environments may experience network outages if targeted. This can disrupt business continuity, remote work, and access to cloud services. Sectors such as finance, healthcare, manufacturing, and government agencies with high reliance on wireless connectivity could face operational delays or interruptions. Although the vulnerability does not lead to data breaches or privilege escalation, denial of service on Wi-Fi adapters can degrade productivity and potentially expose organizations to secondary risks if fallback communication channels are insufficient. The requirement for adjacent access limits remote exploitation but does not eliminate risk in dense urban or office environments where attackers could be physically nearby. The absence of known exploits reduces immediate threat but does not preclude future weaponization. Therefore, European organizations should consider this vulnerability in their risk assessments, especially those with large deployments of affected hardware and Windows 10/11 endpoints.

Mitigation Recommendations

To mitigate CVE-2021-0175, organizations should first identify all devices using Intel PROSet/Wireless and Killer Wi-Fi adapters on Windows 10 and 11. They should monitor vendor advisories from Intel and Killer for firmware and driver updates addressing this vulnerability and apply patches promptly once available. In the interim, network segmentation can limit exposure by isolating critical systems from untrusted wireless networks. Enforcing strong Wi-Fi security protocols (WPA3 or at least WPA2 with robust authentication) reduces the likelihood of unauthorized adjacent access. Physical security controls to restrict attacker proximity to wireless infrastructure are also advisable. Additionally, organizations should implement network monitoring to detect unusual Wi-Fi adapter resets or connectivity drops that may indicate exploitation attempts. Endpoint protection solutions can be configured to alert on driver or firmware anomalies. Finally, educating users about the importance of reporting network disruptions can aid early detection. Avoiding use of affected hardware where possible or replacing it with updated models can be a long-term strategy.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb48d

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:28:03 PM

Last updated: 8/11/2025, 3:43:10 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats