Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24512: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows

0
Medium
VulnerabilityCVE-2025-24512cvecve-2025-24512
Published: Tue Nov 11 2025 (11/11/2025, 16:49:49 UTC)
Source: CVE Database V5
Product: Intel(R) PROSet/Wireless WiFi Software for Windows

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Authorized adversary with an authenticated user combined with a high complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (low) impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:43:50 UTC

Technical Analysis

CVE-2025-24512 is a denial of service (DoS) vulnerability identified in Intel PROSet/Wireless WiFi Software for Windows, specifically affecting versions prior to 23.160. The root cause is improper input validation within device drivers operating at Ring 2 privilege level, which is a kernel-mode execution environment. This flaw allows an authenticated adversary with low privilege (standard user) but requiring local access and high attack complexity, combined with special internal knowledge, to trigger a denial of service condition. The attack does not require user interaction and does not impact confidentiality or integrity, but it can cause system instability or crashes, leading to availability loss. The CVSS 4.0 base score is 5.7 (medium), reflecting the local attack vector (AV:L), high attack complexity (AC:H), required privileges (PR:L), no user interaction (UI:N), and high impact on availability (VA:H). The vulnerability is not known to be exploited in the wild, and no public patches or exploits have been reported yet. The attack scenario involves an authorized user executing crafted inputs that the driver fails to validate properly, causing the system to become unresponsive or crash. Since the vulnerability resides in a widely used Intel wireless driver component for Windows, it potentially affects many enterprise and consumer systems relying on Intel WiFi hardware. The lack of confidentiality or integrity impact limits the scope to availability disruption only. However, the requirement for local authenticated access and high complexity reduces the likelihood of widespread exploitation but does not eliminate targeted attacks by insiders or advanced adversaries.

Potential Impact

For European organizations, the primary impact of CVE-2025-24512 is the potential for denial of service on Windows systems using vulnerable Intel PROSet/Wireless WiFi drivers. This can disrupt business operations, especially in environments relying heavily on wireless connectivity for critical applications or remote work. Availability loss may lead to productivity degradation, operational delays, and increased support costs. Since the vulnerability requires local authenticated access, insider threats or compromised user accounts pose the greatest risk. Organizations with large deployments of Intel wireless hardware in corporate laptops, desktops, or IoT devices may face higher exposure. The absence of confidentiality or integrity impact reduces risks related to data breaches or manipulation, but availability disruptions can still have significant operational consequences. The medium severity rating suggests that while the threat is not critical, it warrants timely attention to prevent potential service outages. In sectors such as finance, healthcare, and government where wireless connectivity is essential, even temporary denial of service can have cascading effects on service delivery and compliance. Additionally, the complexity and knowledge required to exploit this vulnerability may limit attacks to skilled adversaries, including advanced persistent threats (APTs) or malicious insiders.

Mitigation Recommendations

To mitigate CVE-2025-24512, European organizations should prioritize updating Intel PROSet/Wireless WiFi Software to version 23.160 or later once official patches are released by Intel. Until patches are available, restrict local access to systems with vulnerable drivers by enforcing strict access controls and monitoring for unauthorized logins. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts. Implement network segmentation to limit lateral movement from compromised accounts. Educate users about the risks of local privilege misuse and enforce least privilege principles to reduce the number of users with authenticated local access. Regularly audit installed driver versions across the enterprise to identify vulnerable systems. For critical environments, consider temporarily disabling or replacing affected wireless adapters if feasible. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents. Collaborate with Intel and monitor security advisories for updates or additional mitigation guidance. Avoid reliance on generic advice by tailoring controls to the specific environment and threat model, focusing on insider threat detection and local access management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-01-24T04:00:26.768Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b6f12d2ca32afccda36

Added to database: 11/11/2025, 4:59:27 PM

Last enriched: 11/18/2025, 5:43:50 PM

Last updated: 11/22/2025, 7:11:38 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats