Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33029: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows

0
High
VulnerabilityCVE-2025-33029cvecve-2025-33029
Published: Tue Nov 11 2025 (11/11/2025, 16:51:11 UTC)
Source: CVE Database V5
Product: Intel(R) PROSet/Wireless WiFi Software for Windows

Description

Out-of-bounds write for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (high) impacts.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:49:48 UTC

Technical Analysis

CVE-2025-33029 is a vulnerability identified in Intel PROSet/Wireless WiFi Software for Windows, specifically affecting versions before 23.160. The flaw is an out-of-bounds write occurring within the device driver operating at Ring 2 privilege level, which manages wireless network interfaces. This vulnerability can be exploited by an unauthenticated, unprivileged attacker with adjacent network access, meaning the attacker must be on the same local network segment or within wireless range. The attack complexity is low, and no user interaction or special internal knowledge is required, making exploitation feasible in many environments. The out-of-bounds write can cause a denial of service (DoS) by crashing the driver or the entire system, severely impacting system availability. The vulnerability does not affect confidentiality or integrity, as it does not allow data leakage or unauthorized modification. The CVSS 4.0 score is 8.3 (high), reflecting the significant impact on availability combined with the ease of exploitation and lack of required privileges or user interaction. No known exploits have been reported in the wild as of the publication date. The vulnerability is critical for environments relying on Intel wireless drivers, especially in enterprise and industrial settings where system uptime is crucial. The root cause lies in insufficient bounds checking within the driver code, which can be triggered by crafted network packets or frames sent over the wireless interface. This vulnerability underscores the importance of timely patching of device drivers that operate at a low system level and handle external input.

Potential Impact

For European organizations, this vulnerability poses a significant risk to system availability, particularly for those relying heavily on Intel wireless hardware and the PROSet/Wireless WiFi Software on Windows platforms. A successful denial of service attack could disrupt business operations, cause network outages, and impact critical services, especially in sectors such as finance, healthcare, manufacturing, and public administration. The lack of confidentiality or integrity impact limits the risk of data breaches, but availability disruptions can lead to operational downtime and potential financial losses. Organizations with wireless networks accessible to untrusted users or guests are at higher risk due to the adjacent access requirement. Industrial control systems or IoT devices using Intel wireless drivers could also be affected, potentially impacting critical infrastructure. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as the vulnerability is publicly disclosed and could be weaponized. The impact is amplified in environments where wireless connectivity is essential and redundancy is limited.

Mitigation Recommendations

1. Immediately update Intel PROSet/Wireless WiFi Software to version 23.160 or later, as this version contains the fix for the out-of-bounds write vulnerability. 2. Implement network segmentation to limit adjacent network access, especially restricting access to wireless networks from untrusted or guest users. 3. Employ wireless network access controls such as WPA3, strong authentication, and MAC filtering to reduce the attack surface. 4. Monitor network traffic for unusual or malformed packets that could indicate exploitation attempts targeting the wireless driver. 5. For critical systems, consider deploying host-based intrusion detection systems (HIDS) that can detect driver crashes or abnormal system behavior. 6. Maintain an up-to-date asset inventory to identify all devices running vulnerable Intel wireless drivers. 7. Coordinate with Intel and Microsoft for any additional security advisories or patches related to this vulnerability. 8. Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving wireless driver DoS attacks. 9. Where possible, restrict physical access to wireless networks and use wired connections for critical systems to reduce exposure. 10. Test patches in a controlled environment before wide deployment to ensure compatibility and stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-04-15T21:16:05.050Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136b7312d2ca32afccdba8

Added to database: 11/11/2025, 4:59:31 PM

Last enriched: 11/18/2025, 5:49:48 PM

Last updated: 11/22/2025, 3:17:44 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats