CVE-2023-33875

7.1 HIGH

📋 TL;DR

This vulnerability in Intel PROSet/Wireless and Killer Wi-Fi software allows unauthenticated local users to trigger denial of service conditions. It affects systems running vulnerable versions of these Intel wireless drivers and management software. The issue stems from improper access control that doesn't properly restrict local user actions.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless Software
  • Intel Killer Wi-Fi Software
Versions: All versions before 22.240
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with vulnerable Intel wireless adapters and software installed. Not all Intel wireless products are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system instability or crash requiring reboot, potentially disrupting critical operations on affected systems.

🟠

Likely Case

Temporary Wi-Fi service disruption affecting connectivity until system restart or driver reload.

🟢

If Mitigated

Minimal impact with proper network segmentation and user privilege restrictions in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users or malware with local execution can disrupt Wi-Fi services on vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Local access required, no authentication needed. Exploitation likely involves simple local commands or API calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.240 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant or visit Intel Download Center
2. Check for available driver updates for your wireless adapter
3. Install version 22.240 or newer
4. Restart system to complete installation

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit standard user permissions to reduce attack surface

Disable vulnerable services

windows

Temporarily disable Intel wireless management services if not needed

sc stop "Intel(R) Wireless Bluetooth(R)"
sc config "Intel(R) Wireless Bluetooth(R)" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to limit lateral movement
  • Apply principle of least privilege to all user accounts

🔍 How to Verify

Check if Vulnerable:

Check Intel PROSet/Wireless version in Control Panel > Programs and Features or via Device Manager > Network adapters > Intel wireless adapter > Driver tab

Check Version:

wmic path win32_pnpentity where "caption like '%Intel%Wireless%'" get caption, driverVersion

Verify Fix Applied:

Verify installed version is 22.240 or higher using same method

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes of Intel wireless services
  • Access denied errors in application logs related to wireless services
  • Multiple failed privilege escalation attempts

Network Indicators:

  • Sudden Wi-Fi disconnections on multiple systems
  • Unusual local network traffic to wireless service ports

SIEM Query:

EventID=7034 OR EventID=6008 | where ServiceName contains "Intel" and ServiceName contains "Wireless"

🔗 References

📤 Share & Export