Skip to main content

CVE-2021-0183: denial of service in Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-0183cvecve-2021-0183
Published: Wed Feb 09 2022 (02/09/2022, 22:04:32 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11

Description

Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 21:57:49 UTC

Technical Analysis

CVE-2021-0183 is a vulnerability identified in Intel(R) PROSet/Wireless Wi-Fi software across multiple operating systems and certain Killer(TM) Wi-Fi adapters running on Windows 10 and Windows 11. The root cause of this vulnerability is improper validation of specified index, position, or offset in the input processing routines. This flaw allows an unauthenticated attacker with adjacent network access—meaning they must be within wireless range—to trigger a denial of service (DoS) condition. Specifically, the attacker can send crafted input to the affected Wi-Fi software components, causing them to mishandle the input and crash or become unresponsive, thereby disrupting wireless connectivity. The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the software fails to properly validate input parameters before use. The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no official patches are linked in the provided information, though Intel and affected vendors likely have released updates. The vulnerability affects wireless drivers and software components that are widely used in laptops and desktops equipped with Intel PROSet/Wireless and Killer Wi-Fi adapters, which are common in consumer and enterprise environments. The flaw can be exploited remotely by attackers within wireless range without authentication, making it a significant risk for wireless network availability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of wireless network services. Enterprises relying on Intel PROSet/Wireless and Killer Wi-Fi adapters in their Windows 10 and 11 devices may experience network outages or disruptions if targeted by an attacker in proximity. This can affect business continuity, especially in environments where wireless connectivity is critical for operations, such as offices, manufacturing floors, or public service centers. The denial of service could lead to loss of productivity, interruption of critical communications, and potential cascading effects on other network-dependent systems. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can be severe in high-density environments or where wireless access points serve many users. Additionally, since the attack requires adjacent access, organizations with open or poorly secured wireless networks are at higher risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate the risk, especially as threat actors may develop exploits over time. European organizations with extensive use of Intel wireless hardware, particularly in sectors such as finance, government, healthcare, and critical infrastructure, should consider this vulnerability seriously due to the potential operational disruptions.

Mitigation Recommendations

To mitigate CVE-2021-0183, European organizations should take the following specific actions: 1) Identify and inventory all devices using Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi adapters running Windows 10 or 11. 2) Apply the latest firmware and driver updates from Intel and device manufacturers as soon as they become available, as these will contain patches addressing the vulnerability. 3) Implement wireless network segmentation and strong access controls to limit the ability of unauthorized users to connect to or be within range of sensitive wireless networks. 4) Use network monitoring tools to detect unusual wireless traffic patterns that may indicate attempts to exploit this vulnerability. 5) Enforce strong Wi-Fi encryption (WPA3 or WPA2 with robust configurations) and disable open or guest wireless networks where possible to reduce adjacent access risk. 6) Educate users about the risks of connecting to untrusted wireless networks and encourage the use of VPNs for sensitive communications. 7) For critical environments, consider deploying additional wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block malicious wireless activity. 8) Maintain an incident response plan that includes procedures for wireless network outages and DoS incidents. These measures go beyond generic advice by focusing on proactive identification, patch management, network segmentation, and monitoring tailored to the wireless context of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2020-10-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb9e8

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 9:57:49 PM

Last updated: 7/29/2025, 12:53:20 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats