Skip to main content

CVE-2025-20625: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows

High
VulnerabilityCVE-2025-20625cvecve-2025-20625
Published: Tue Aug 12 2025 (08/12/2025, 16:58:21 UTC)
Source: CVE Database V5
Product: Intel(R) PROSet/Wireless WiFi Software for Windows

Description

Improper conditions check for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.110.0.5 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

AI-Powered Analysis

AILast updated: 08/12/2025, 17:49:37 UTC

Technical Analysis

CVE-2025-20625 is a high-severity vulnerability affecting Intel(R) PROSet/Wireless WiFi Software for Windows versions prior to 23.110.0.5. The flaw arises from improper condition checks within the software, which manages wireless network connectivity on Windows systems. Specifically, the vulnerability allows an unauthenticated attacker with adjacent network access—meaning they must be within the same local network or wireless range—to trigger a denial of service (DoS) condition. This DoS could manifest as a crash or forced restart of the wireless driver or software component, resulting in loss of wireless connectivity. The vulnerability does not require user interaction or privileges, making exploitation relatively straightforward for nearby attackers. The CVSS 4.0 base score of 7.1 reflects the high impact on availability (denial of service) with low attack complexity and no authentication required. There is no indication of confidentiality or integrity impact, nor is there evidence of exploitation in the wild at this time. Intel has reserved the CVE since January 2025 and published it in August 2025, but no patch links are currently provided, indicating that affected users should monitor Intel advisories closely for updates. The vulnerability is specific to Intel's PROSet/Wireless WiFi Software on Windows, which is widely used to manage Intel wireless adapters.

Potential Impact

For European organizations, this vulnerability poses a significant risk to wireless network availability, particularly in environments relying on Intel wireless adapters managed by the PROSet software. Loss of wireless connectivity can disrupt business operations, especially in sectors dependent on continuous network access such as finance, healthcare, manufacturing, and critical infrastructure. The unauthenticated nature of the attack means that any attacker within wireless range—such as visitors, contractors, or malicious insiders—could disrupt network services without needing credentials. This could lead to operational downtime, reduced productivity, and potential safety risks in environments where wireless connectivity supports critical systems. Additionally, denial of service attacks could be used as a diversion for other malicious activities. Although no known exploits are currently reported, the relatively low complexity and lack of required privileges make this vulnerability attractive for attackers once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately inventory their use of Intel PROSet/Wireless WiFi Software on Windows systems and identify versions prior to 23.110.0.5. Until a patch is released, organizations should consider the following mitigations: 1) Restrict physical and wireless access to trusted personnel only, using strong WiFi encryption (WPA3 where possible) and network segmentation to limit exposure to adjacent attackers. 2) Employ network monitoring to detect unusual wireless disconnections or driver crashes that may indicate exploitation attempts. 3) Disable or limit the use of Intel PROSet/Wireless WiFi Software features if feasible, or temporarily switch to native Windows wireless drivers if they do not exhibit the vulnerability. 4) Educate users and IT staff about the risk and signs of wireless disruption. 5) Prepare for rapid deployment of patches once Intel releases an update by establishing a patch management process prioritizing wireless driver/software updates. 6) Consider implementing wireless intrusion detection/prevention systems (WIDS/WIPS) to detect and block suspicious adjacent network activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-01-06T23:39:39.869Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b774fad5a09ad003492d1

Added to database: 8/12/2025, 5:18:07 PM

Last enriched: 8/12/2025, 5:49:37 PM

Last updated: 8/19/2025, 12:34:30 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats