CVE-2025-20046: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI Analysis
Technical Summary
CVE-2025-20046 is a high-severity vulnerability identified in Intel(R) PROSet/Wireless WiFi Software for Windows versions prior to 23.100. The flaw is a use-after-free condition, a type of memory corruption vulnerability where the software continues to use memory after it has been freed. This can lead to unpredictable behavior, including crashes or denial of service (DoS). The vulnerability can be triggered by an unauthenticated attacker with adjacent access, meaning the attacker must be on the same local network segment or have some form of local network proximity to the target system. Exploitation does not require user interaction or privileges, making it easier for attackers to leverage. The CVSS 4.0 base score is 7.2, reflecting a high severity due to the potential for complete denial of service impacting system availability. The attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality is none, but integrity and availability impacts are high. The vulnerability affects the Intel PROSet/Wireless WiFi Software, which is widely used to manage Intel wireless adapters on Windows platforms. Since the flaw is a use-after-free, it could cause the wireless driver or associated software components to crash, disrupting network connectivity and potentially causing system instability or reboot loops. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and patched in version 23.100 and later. Organizations running affected versions on Windows systems with Intel wireless adapters are at risk of network disruption and should prioritize patching.
Potential Impact
For European organizations, the impact of CVE-2025-20046 can be significant, especially for enterprises and critical infrastructure relying on stable wireless connectivity. A successful denial of service attack could disrupt business operations, cause loss of productivity, and impact services dependent on wireless networks. Industries such as finance, healthcare, manufacturing, and government agencies that utilize Intel wireless adapters extensively may face operational downtime and potential cascading effects on dependent systems. The vulnerability could also be exploited in targeted attacks to cause network outages or as part of a larger attack chain. Given the unauthenticated nature and lack of user interaction required, attackers can potentially automate exploitation within local networks, increasing the risk in environments with many wireless devices. The disruption of wireless connectivity could also affect remote work capabilities and IoT devices connected via Intel wireless hardware. While confidentiality is not directly impacted, the loss of availability and integrity of wireless communications can have serious operational consequences.
Mitigation Recommendations
To mitigate CVE-2025-20046, European organizations should immediately identify all Windows systems running Intel PROSet/Wireless WiFi Software versions prior to 23.100. Deploy the vendor-released patch or upgrade to version 23.100 or later as soon as possible. In environments where immediate patching is not feasible, network segmentation should be enforced to limit adjacent network access to critical systems, reducing the attack surface. Monitoring network traffic for unusual activity on wireless interfaces can help detect exploitation attempts. Disable or restrict wireless adapter usage on systems where it is not essential. Implement strict access controls on local networks, including the use of VLANs and NAC (Network Access Control) solutions to prevent unauthorized devices from gaining adjacent network access. Regularly audit and update wireless drivers and management software to ensure they are current. Additionally, educate IT staff about the vulnerability and ensure incident response plans include steps for wireless network disruptions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2025-20046: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
Description
Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
AI-Powered Analysis
Technical Analysis
CVE-2025-20046 is a high-severity vulnerability identified in Intel(R) PROSet/Wireless WiFi Software for Windows versions prior to 23.100. The flaw is a use-after-free condition, a type of memory corruption vulnerability where the software continues to use memory after it has been freed. This can lead to unpredictable behavior, including crashes or denial of service (DoS). The vulnerability can be triggered by an unauthenticated attacker with adjacent access, meaning the attacker must be on the same local network segment or have some form of local network proximity to the target system. Exploitation does not require user interaction or privileges, making it easier for attackers to leverage. The CVSS 4.0 base score is 7.2, reflecting a high severity due to the potential for complete denial of service impacting system availability. The attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality is none, but integrity and availability impacts are high. The vulnerability affects the Intel PROSet/Wireless WiFi Software, which is widely used to manage Intel wireless adapters on Windows platforms. Since the flaw is a use-after-free, it could cause the wireless driver or associated software components to crash, disrupting network connectivity and potentially causing system instability or reboot loops. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and patched in version 23.100 and later. Organizations running affected versions on Windows systems with Intel wireless adapters are at risk of network disruption and should prioritize patching.
Potential Impact
For European organizations, the impact of CVE-2025-20046 can be significant, especially for enterprises and critical infrastructure relying on stable wireless connectivity. A successful denial of service attack could disrupt business operations, cause loss of productivity, and impact services dependent on wireless networks. Industries such as finance, healthcare, manufacturing, and government agencies that utilize Intel wireless adapters extensively may face operational downtime and potential cascading effects on dependent systems. The vulnerability could also be exploited in targeted attacks to cause network outages or as part of a larger attack chain. Given the unauthenticated nature and lack of user interaction required, attackers can potentially automate exploitation within local networks, increasing the risk in environments with many wireless devices. The disruption of wireless connectivity could also affect remote work capabilities and IoT devices connected via Intel wireless hardware. While confidentiality is not directly impacted, the loss of availability and integrity of wireless communications can have serious operational consequences.
Mitigation Recommendations
To mitigate CVE-2025-20046, European organizations should immediately identify all Windows systems running Intel PROSet/Wireless WiFi Software versions prior to 23.100. Deploy the vendor-released patch or upgrade to version 23.100 or later as soon as possible. In environments where immediate patching is not feasible, network segmentation should be enforced to limit adjacent network access to critical systems, reducing the attack surface. Monitoring network traffic for unusual activity on wireless interfaces can help detect exploitation attempts. Disable or restrict wireless adapter usage on systems where it is not essential. Implement strict access controls on local networks, including the use of VLANs and NAC (Network Access Control) solutions to prevent unauthorized devices from gaining adjacent network access. Regularly audit and update wireless drivers and management software to ensure they are current. Additionally, educate IT staff about the vulnerability and ensure incident response plans include steps for wireless network disruptions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2024-10-13T03:00:13.109Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aeca9f
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 4:11:01 PM
Last updated: 7/29/2025, 2:57:21 AM
Views: 11
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.