CVE-2021-23168: denial of service in Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI Analysis
Technical Summary
CVE-2021-23168 is a vulnerability identified in certain Intel PROSet/Wireless WiFi and Killer WiFi products. The issue is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data outside the boundaries of allocated memory buffers. This flaw can be triggered by an unauthenticated attacker who is adjacent to the vulnerable device, meaning they are within wireless communication range. Exploiting this vulnerability could lead to a denial of service (DoS) condition, where the affected WiFi device or driver crashes or becomes unresponsive, disrupting network connectivity. The vulnerability does not impact confidentiality or integrity directly but affects availability by causing service interruptions. The CVSS v3.1 base score is 6.5 (medium severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H indicating that the attack requires adjacent network access, low attack complexity, no privileges or user interaction, and results in high impact on availability. No known exploits are reported in the wild, and no patches are linked in the provided data, though it is likely that Intel has addressed this in updates. The vulnerability affects wireless network drivers and software components that manage WiFi connectivity on devices using Intel PROSet/Wireless and Killer WiFi products, which are commonly integrated into laptops, desktops, and other wireless-enabled devices.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of wireless network services. Enterprises relying on Intel PROSet/Wireless or Killer WiFi adapters in their endpoint devices could experience network disruptions if an attacker within wireless range exploits this flaw. This could impact business continuity, especially in environments where wireless connectivity is critical, such as offices, manufacturing floors, or public access points. Although the vulnerability does not compromise data confidentiality or integrity, denial of service attacks can degrade operational efficiency and potentially cause cascading effects if critical systems lose network access. Given the requirement for adjacent access, the threat is more relevant in densely populated or public environments where attackers can physically approach targets. Remote exploitation is not feasible, limiting the scope to local attackers or insiders. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
Organizations should ensure that all devices using Intel PROSet/Wireless and Killer WiFi products are updated with the latest drivers and firmware provided by Intel or device manufacturers, as patches addressing this vulnerability are likely available beyond the provided data. Network administrators should implement wireless network segmentation and monitoring to detect unusual activity or repeated connection attempts that could indicate exploitation attempts. Limiting physical access to sensitive areas and enforcing strong wireless security policies (e.g., WPA3, network access control) can reduce the risk of adjacent attackers. Additionally, organizations should consider deploying intrusion detection systems capable of monitoring wireless traffic anomalies. Endpoint security solutions should be configured to alert on driver crashes or network interface failures that may result from exploitation attempts. Finally, educating staff about the risks of connecting to untrusted wireless networks and maintaining physical security around wireless infrastructure can further mitigate exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2021-23168: denial of service in Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products
Description
Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2021-23168 is a vulnerability identified in certain Intel PROSet/Wireless WiFi and Killer WiFi products. The issue is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data outside the boundaries of allocated memory buffers. This flaw can be triggered by an unauthenticated attacker who is adjacent to the vulnerable device, meaning they are within wireless communication range. Exploiting this vulnerability could lead to a denial of service (DoS) condition, where the affected WiFi device or driver crashes or becomes unresponsive, disrupting network connectivity. The vulnerability does not impact confidentiality or integrity directly but affects availability by causing service interruptions. The CVSS v3.1 base score is 6.5 (medium severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H indicating that the attack requires adjacent network access, low attack complexity, no privileges or user interaction, and results in high impact on availability. No known exploits are reported in the wild, and no patches are linked in the provided data, though it is likely that Intel has addressed this in updates. The vulnerability affects wireless network drivers and software components that manage WiFi connectivity on devices using Intel PROSet/Wireless and Killer WiFi products, which are commonly integrated into laptops, desktops, and other wireless-enabled devices.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of wireless network services. Enterprises relying on Intel PROSet/Wireless or Killer WiFi adapters in their endpoint devices could experience network disruptions if an attacker within wireless range exploits this flaw. This could impact business continuity, especially in environments where wireless connectivity is critical, such as offices, manufacturing floors, or public access points. Although the vulnerability does not compromise data confidentiality or integrity, denial of service attacks can degrade operational efficiency and potentially cause cascading effects if critical systems lose network access. Given the requirement for adjacent access, the threat is more relevant in densely populated or public environments where attackers can physically approach targets. Remote exploitation is not feasible, limiting the scope to local attackers or insiders. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
Organizations should ensure that all devices using Intel PROSet/Wireless and Killer WiFi products are updated with the latest drivers and firmware provided by Intel or device manufacturers, as patches addressing this vulnerability are likely available beyond the provided data. Network administrators should implement wireless network segmentation and monitoring to detect unusual activity or repeated connection attempts that could indicate exploitation attempts. Limiting physical access to sensitive areas and enforcing strong wireless security policies (e.g., WPA3, network access control) can reduce the risk of adjacent attackers. Additionally, organizations should consider deploying intrusion detection systems capable of monitoring wireless traffic anomalies. Endpoint security solutions should be configured to alert on driver crashes or network interface failures that may result from exploitation attempts. Finally, educating staff about the risks of connecting to untrusted wireless networks and maintaining physical security around wireless infrastructure can further mitigate exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2021-12-09T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdba46
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 9:58:01 PM
Last updated: 8/13/2025, 8:03:11 PM
Views: 11
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.