Skip to main content

CVE-2021-33113: denial of service or information disclosure in Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11

High
VulnerabilityCVE-2021-33113cvecve-2021-33113
Published: Wed Feb 09 2022 (02/09/2022, 22:04:38 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

AI-Powered Analysis

AILast updated: 07/03/2025, 10:41:23 UTC

Technical Analysis

CVE-2021-33113 is a high-severity vulnerability affecting Intel(R) PROSet/Wireless WiFi drivers across multiple operating systems and Killer(TM) WiFi drivers specifically on Windows 10 and 11. The root cause is improper input validation, classified under CWE-20, which allows an unauthenticated attacker with adjacent network access to exploit the vulnerability. The attack vector is adjacent (AV:A), meaning the attacker must be on the same local network segment or within radio range to the victim device. The vulnerability does not require any privileges or user interaction, increasing its risk profile. Successful exploitation can lead to denial of service (DoS) conditions or information disclosure, impacting confidentiality and availability. The CVSS 3.1 base score is 8.1, reflecting the high impact on confidentiality (C:H) and availability (A:H), with no impact on integrity (I:N). The vulnerability affects wireless network drivers that are widely used in consumer and enterprise laptops and desktops, potentially impacting network connectivity and exposing sensitive information transmitted or processed by the driver. No known exploits are currently reported in the wild, but the presence of this vulnerability in common wireless drivers makes it a significant concern for organizations relying on Intel and Killer WiFi hardware. The vulnerability was published in February 2022, with the initial reservation in May 2021. The lack of available patches in the provided data suggests organizations should verify with vendors for updates or mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments with dense wireless network usage such as corporate offices, public WiFi hotspots, and industrial settings. The denial of service aspect could disrupt critical business operations by incapacitating wireless connectivity, leading to productivity losses and potential operational downtime. Information disclosure could expose sensitive corporate data or personal information, violating GDPR and other data protection regulations, leading to legal and financial repercussions. The fact that exploitation requires only adjacent access means attackers could leverage compromised devices within the network or physically nearby to launch attacks, increasing the threat surface. Organizations with remote or hybrid workforces relying on WiFi connectivity are particularly vulnerable. Additionally, sectors such as finance, healthcare, and government, which often use Intel/Killer WiFi hardware in their endpoints, may face elevated risks due to the sensitivity of their data and regulatory requirements.

Mitigation Recommendations

1. Immediate verification of driver versions and firmware for Intel PROSet/Wireless and Killer WiFi devices is essential. Organizations should consult Intel and device manufacturers for official patches or updated driver releases addressing CVE-2021-33113. 2. Where patches are not yet available, consider disabling affected wireless adapters temporarily or restricting wireless network access to trusted devices only. 3. Implement network segmentation to limit the ability of an attacker to gain adjacent access to critical systems, especially segmenting guest and IoT wireless networks from corporate assets. 4. Employ wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous activity that could indicate exploitation attempts. 5. Enforce strong WiFi encryption standards (WPA3 where possible) and robust authentication mechanisms to reduce the risk of unauthorized adjacent access. 6. Educate users about the risks of connecting to untrusted wireless networks and encourage the use of VPNs for sensitive communications. 7. Maintain up-to-date asset inventories to quickly identify devices using vulnerable drivers and prioritize remediation efforts. 8. Monitor security advisories from Intel and Microsoft closely for new patches or mitigation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbae2

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/3/2025, 10:41:23 AM

Last updated: 7/26/2025, 6:25:57 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats