Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-44545: denial of service in Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products

0
Medium
VulnerabilityCVE-2021-44545cvecve-2021-44545
Published: Thu Aug 18 2022 (08/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 07/06/2025, 22:42:13 UTC

Technical Analysis

CVE-2021-44545 is a medium-severity vulnerability affecting Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products. The root cause is improper input validation, which allows an unauthenticated attacker in adjacent proximity to the vulnerable device to trigger a denial of service (DoS) condition. Specifically, the flaw resides in the way these wireless drivers handle certain inputs, potentially causing the device to crash or become unresponsive. Since the attack vector is adjacent network access, the attacker must be within wireless range but does not require any authentication or user interaction to exploit this vulnerability. The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the affected software fails to properly validate or sanitize input data, leading to unexpected behavior. The CVSS v3.1 base score is 6.5, reflecting a medium impact primarily on availability, with no impact on confidentiality or integrity. No known exploits have been reported in the wild as of the publication date. The vulnerability affects multiple versions of Intel PROSet/Wireless and Killer WiFi products, though specific affected versions are not detailed here. This vulnerability could be leveraged to disrupt wireless connectivity by causing device crashes or resets, impacting network availability for affected systems.

Potential Impact

For European organizations, the primary impact of CVE-2021-44545 is the potential disruption of wireless network connectivity. Organizations relying heavily on Intel PROSet/Wireless and Killer WiFi adapters in their infrastructure, including corporate laptops, desktops, and wireless access points, may experience service interruptions if an attacker exploits this vulnerability. This could affect business continuity, especially in environments where wireless connectivity is critical, such as remote work setups, manufacturing floors, or retail environments. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service could lead to productivity losses and increased operational costs due to downtime and troubleshooting. Additionally, sectors with high reliance on wireless communications, such as finance, healthcare, and government agencies, may face increased risks of operational disruption. The requirement for adjacent access limits the attack scope to physical proximity, reducing the risk of large-scale remote exploitation but increasing the risk in densely populated or public wireless environments.

Mitigation Recommendations

To mitigate CVE-2021-44545, European organizations should prioritize the following actions: 1) Identify and inventory all devices using Intel PROSet/Wireless and Killer WiFi products to understand exposure. 2) Apply vendor-provided patches or updates as soon as they become available; monitor Intel’s advisories for official fixes. 3) Implement wireless network segmentation and restrict access to critical systems to minimize the impact of potential DoS attacks. 4) Employ wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor for suspicious adjacent network activity that could indicate exploitation attempts. 5) Limit physical access to sensitive wireless environments and enforce strong physical security controls to reduce the risk of attackers gaining adjacent access. 6) Educate IT staff about this vulnerability and ensure incident response plans include procedures for wireless network disruptions. 7) Where feasible, consider deploying alternative wireless adapters or drivers not affected by this vulnerability until patches are applied. These steps go beyond generic advice by focusing on proactive network monitoring, physical security, and inventory management tailored to the specific nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2021-12-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbc38

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 10:42:13 PM

Last updated: 2/7/2026, 9:18:00 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats