CVE-2025-35963: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
Insufficient control flow management for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (high) impacts.
AI Analysis
Technical Summary
CVE-2025-35963 is a denial of service (DoS) vulnerability identified in Intel PROSet/Wireless WiFi Software for Windows, specifically in versions prior to 23.160. The root cause is insufficient control flow management within the device drivers operating at Ring 2 privilege level, which governs hardware interaction. This flaw allows an unauthenticated and unprivileged attacker with adjacent network access—meaning they must be on the same local network segment or physically close—to trigger a denial of service condition. The attack does not require user interaction or special internal knowledge, and the complexity is low, making it relatively easy to exploit. The vulnerability solely impacts system availability, causing potential crashes or system hangs, but does not compromise confidentiality or integrity of data. The CVSS 4.0 score of 8.3 reflects the high severity due to the ease of exploitation and significant impact on availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated as a serious risk. Intel PROSet/Wireless WiFi Software is widely used in enterprise and consumer Windows environments, making the scope of affected systems broad. The vulnerability highlights the risks associated with device driver security and the importance of timely patching to maintain system stability and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk to operational continuity, especially in sectors relying heavily on wireless connectivity such as finance, healthcare, manufacturing, and critical infrastructure. A successful DoS attack could disrupt wireless network availability, leading to loss of productivity, interruption of critical services, and potential cascading effects on dependent systems. Since the attack requires only adjacent network access, attackers could exploit unsecured or poorly segmented wireless networks, including guest or public WiFi environments. The lack of confidentiality and integrity impact limits data breach concerns, but availability disruptions can cause severe business impact and potential regulatory scrutiny under frameworks like NIS2 and GDPR if service outages affect personal data processing or critical services. The broad deployment of Intel wireless drivers in corporate laptops and desktops across Europe increases the potential attack surface. Organizations with remote or hybrid workforces using wireless connections are also at elevated risk. The absence of known exploits in the wild currently reduces immediate threat but does not diminish the urgency of mitigation.
Mitigation Recommendations
1. Immediate patching: Organizations should prioritize updating Intel PROSet/Wireless WiFi Software to version 23.160 or later as soon as patches become available from Intel or OEM vendors. 2. Network segmentation: Limit adjacent network access by segmenting wireless networks, isolating critical systems, and restricting access to trusted devices only. 3. Access controls: Implement strong wireless access controls including WPA3 encryption, MAC filtering, and network access control (NAC) solutions to reduce exposure. 4. Monitoring and detection: Deploy network monitoring tools to detect unusual wireless traffic patterns or repeated connection failures indicative of DoS attempts. 5. Incident response readiness: Prepare response plans for potential wireless network outages, including fallback connectivity options and communication protocols. 6. Vendor coordination: Engage with hardware and software vendors to ensure timely updates and verify driver versions in use across the organization. 7. User awareness: Educate users about risks of connecting to untrusted wireless networks and encourage use of VPNs for remote access. These steps go beyond generic advice by focusing on controlling adjacent network access and emphasizing proactive patch management and network architecture adjustments specific to wireless environments.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-35963: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
Description
Insufficient control flow management for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (high) impacts.
AI-Powered Analysis
Technical Analysis
CVE-2025-35963 is a denial of service (DoS) vulnerability identified in Intel PROSet/Wireless WiFi Software for Windows, specifically in versions prior to 23.160. The root cause is insufficient control flow management within the device drivers operating at Ring 2 privilege level, which governs hardware interaction. This flaw allows an unauthenticated and unprivileged attacker with adjacent network access—meaning they must be on the same local network segment or physically close—to trigger a denial of service condition. The attack does not require user interaction or special internal knowledge, and the complexity is low, making it relatively easy to exploit. The vulnerability solely impacts system availability, causing potential crashes or system hangs, but does not compromise confidentiality or integrity of data. The CVSS 4.0 score of 8.3 reflects the high severity due to the ease of exploitation and significant impact on availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated as a serious risk. Intel PROSet/Wireless WiFi Software is widely used in enterprise and consumer Windows environments, making the scope of affected systems broad. The vulnerability highlights the risks associated with device driver security and the importance of timely patching to maintain system stability and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk to operational continuity, especially in sectors relying heavily on wireless connectivity such as finance, healthcare, manufacturing, and critical infrastructure. A successful DoS attack could disrupt wireless network availability, leading to loss of productivity, interruption of critical services, and potential cascading effects on dependent systems. Since the attack requires only adjacent network access, attackers could exploit unsecured or poorly segmented wireless networks, including guest or public WiFi environments. The lack of confidentiality and integrity impact limits data breach concerns, but availability disruptions can cause severe business impact and potential regulatory scrutiny under frameworks like NIS2 and GDPR if service outages affect personal data processing or critical services. The broad deployment of Intel wireless drivers in corporate laptops and desktops across Europe increases the potential attack surface. Organizations with remote or hybrid workforces using wireless connections are also at elevated risk. The absence of known exploits in the wild currently reduces immediate threat but does not diminish the urgency of mitigation.
Mitigation Recommendations
1. Immediate patching: Organizations should prioritize updating Intel PROSet/Wireless WiFi Software to version 23.160 or later as soon as patches become available from Intel or OEM vendors. 2. Network segmentation: Limit adjacent network access by segmenting wireless networks, isolating critical systems, and restricting access to trusted devices only. 3. Access controls: Implement strong wireless access controls including WPA3 encryption, MAC filtering, and network access control (NAC) solutions to reduce exposure. 4. Monitoring and detection: Deploy network monitoring tools to detect unusual wireless traffic patterns or repeated connection failures indicative of DoS attempts. 5. Incident response readiness: Prepare response plans for potential wireless network outages, including fallback connectivity options and communication protocols. 6. Vendor coordination: Engage with hardware and software vendors to ensure timely updates and verify driver versions in use across the organization. 7. User awareness: Educate users about risks of connecting to untrusted wireless networks and encourage use of VPNs for remote access. These steps go beyond generic advice by focusing on controlling adjacent network access and emphasizing proactive patch management and network architecture adjustments specific to wireless environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- intel
- Date Reserved
- 2025-04-15T21:16:05.087Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69136b7312d2ca32afccdbab
Added to database: 11/11/2025, 4:59:31 PM
Last enriched: 11/18/2025, 5:50:03 PM
Last updated: 11/22/2025, 9:56:05 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.