Skip to main content

CVE-2021-33114: denial of service in Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11

Medium
VulnerabilityCVE-2021-33114cvecve-2021-33114
Published: Wed Feb 09 2022 (02/09/2022, 22:04:40 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:25:19 UTC

Technical Analysis

CVE-2021-33114 is a medium-severity vulnerability affecting Intel(R) PROSet/Wireless WiFi drivers across multiple operating systems and Killer(TM) WiFi drivers specifically on Windows 10 and Windows 11 platforms. The root cause of this vulnerability is improper input validation, classified under CWE-20, which allows an authenticated user with adjacent network access to potentially trigger a denial of service (DoS) condition. This means that an attacker who is within the wireless network range and has some level of authenticated access to the WiFi network can exploit this flaw to disrupt the normal operation of the affected wireless drivers, causing them to crash or become unresponsive. The vulnerability does not impact confidentiality or integrity but directly affects availability, potentially leading to loss of network connectivity for the affected device. The CVSS v3.1 base score is 5.7, reflecting a medium severity level, with an attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches or vendor advisories are linked in the provided data, though it is likely that Intel or device manufacturers have addressed this in subsequent driver updates. This vulnerability primarily affects devices using Intel PROSet/Wireless WiFi drivers and Killer WiFi adapters on Windows 10 and 11, which are common in many enterprise and consumer laptops and desktops. The improper input validation could be triggered by crafted network packets or frames sent by an attacker on the same wireless network segment, causing the wireless driver to fail and resulting in a denial of service condition.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of wireless network connectivity on affected devices. Enterprises relying heavily on Intel PROSet/Wireless or Killer WiFi adapters for their corporate laptops, especially those using Windows 10 or 11, could experience network disruptions if an attacker gains adjacent network access. This could impact productivity, especially in environments where wireless connectivity is critical, such as remote work setups, manufacturing floors, or retail environments. Although the vulnerability requires the attacker to be on the same wireless network segment, this is a realistic threat in public WiFi hotspots, corporate guest networks, or poorly segmented internal wireless networks. The lack of impact on confidentiality or integrity reduces the risk of data breaches but does not diminish the operational disruption potential. Additionally, denial of service attacks could be used as a distraction or part of a multi-stage attack. Given the medium severity and the requirement for adjacent access and low privileges, the threat is moderate but should not be ignored in security planning and risk assessments.

Mitigation Recommendations

To mitigate CVE-2021-33114, European organizations should take the following specific actions: 1) Ensure all wireless network drivers, especially Intel PROSet/Wireless and Killer WiFi drivers on Windows 10 and 11 devices, are updated to the latest versions provided by Intel or device manufacturers, as patches may have been released post-disclosure. 2) Implement strict wireless network segmentation and access controls to limit the ability of potentially malicious users to gain adjacent network access. This includes separating guest and corporate wireless networks and enforcing strong authentication mechanisms such as WPA3 or enterprise-grade WPA2 with 802.1X. 3) Monitor wireless network traffic for unusual patterns or repeated connection drops that may indicate exploitation attempts. 4) Educate users about the risks of connecting to untrusted wireless networks and encourage the use of VPNs when accessing corporate resources over WiFi. 5) Consider deploying endpoint detection and response (EDR) solutions that can detect anomalous driver crashes or network disruptions related to this vulnerability. 6) Regularly audit and inventory devices to identify those using vulnerable wireless drivers and prioritize remediation. These steps go beyond generic advice by focusing on driver updates, network segmentation, and monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbafc

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:25:19 PM

Last updated: 7/26/2025, 12:46:58 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats