CVE-2021-0078

8.1 HIGH

📋 TL;DR

This vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows 10 allows unauthenticated attackers on the same network to potentially cause denial of service or information disclosure through improper input validation. It affects users with vulnerable Intel WiFi adapters running affected software versions. Attackers must be in physical proximity or on the same wireless network.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless WiFi Software
  • Intel Killer WiFi Software
Versions: Versions before 22.40.0.6
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with specific Intel WiFi adapters using vulnerable driver versions. Requires WiFi to be enabled and connected to a network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or kernel panic leading to persistent denial of service, plus potential memory disclosure revealing sensitive system information or credentials.

🟠

Likely Case

Temporary WiFi disconnection or system instability requiring reboot, with possible limited information leakage from driver memory.

🟢

If Mitigated

No impact if patched or if attacker cannot reach vulnerable system via adjacent network access.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly exploitable from internet.
🏢 Internal Only: HIGH - Exploitable by anyone on the same wireless network or physically adjacent.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted packets to the vulnerable WiFi interface from adjacent network position.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.40.0.6 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html

Restart Required: Yes

Instructions:

1. Download latest Intel WiFi driver from Intel website or Windows Update. 2. Run installer with administrative privileges. 3. Restart system when prompted.

🔧 Temporary Workarounds

Disable vulnerable WiFi adapter

windows

Temporarily disable the Intel WiFi adapter to prevent exploitation

netsh interface set interface "Wi-Fi" admin=disable

Use wired connection only

windows

Disable WiFi and use Ethernet connection exclusively

🧯 If You Can't Patch

  • Segment wireless networks to limit adjacent access
  • Implement network access control to restrict which devices can connect to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check Intel WiFi driver version in Device Manager > Network adapters > Intel WiFi adapter > Driver tab

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%intel%wifi%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version is 22.40.0.6 or higher in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • System crashes or unexpected reboots
  • WiFi driver error events in Windows Event Log
  • Network interface resets

Network Indicators:

  • Unusual broadcast/multicast traffic to WiFi interface
  • Malformed WiFi management frames

SIEM Query:

EventID=1001 OR EventID=41 OR (EventID=7026 AND Source="Service Control Manager" AND "Intel(R) Wireless" in EventData)

🔗 References

📤 Share & Export