CVE-2024-41166

6.1 MEDIUM

📋 TL;DR

A stack-based buffer overflow vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows allows unauthenticated attackers on the same network to potentially cause denial of service. This affects users with vulnerable Intel WiFi adapters running outdated software versions. The attack requires physical proximity to the target network.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless WiFi software
  • Intel Killer WiFi software
Versions: All versions before 23.80
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel WiFi adapters using vulnerable software. Requires attacker to be on same wireless network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or blue screen requiring physical reboot, potentially disrupting critical operations on affected devices.

🟠

Likely Case

Temporary WiFi disconnection or system instability requiring user intervention to restore connectivity.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated software.

🌐 Internet-Facing: LOW - Attack requires adjacent network access, not internet exposure.
🏢 Internal Only: MEDIUM - Internal attackers on same network segment could disrupt WiFi connectivity.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires adjacent network access and knowledge of vulnerable systems. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.80 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant from Intel website
2. Run the tool to detect vulnerable software
3. Follow prompts to update to version 23.80 or later
4. Restart system when prompted

🔧 Temporary Workarounds

Disable vulnerable WiFi adapter

windows

Temporarily disable Intel WiFi adapter to prevent exploitation

netsh interface set interface "Wi-Fi" admin=disable

Use wired connection

windows

Switch to Ethernet connection and disable WiFi

🧯 If You Can't Patch

  • Segment wireless networks to limit adjacent access
  • Implement network monitoring for unusual WiFi traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check Intel PROSet/Wireless WiFi software version in Control Panel > Programs and Features

Check Version:

wmic product where "name like '%Intel%WiFi%'" get name,version

Verify Fix Applied:

Verify software version is 23.80 or higher in Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • System crash logs (Event ID 41)
  • WiFi driver crash events
  • Unexpected system reboots

Network Indicators:

  • Unusual broadcast/multicast traffic on WiFi
  • Malformed WiFi packets targeting Intel adapters

SIEM Query:

EventID=41 OR (Source="IntelWiFi" AND EventID=1000)

🔗 References

📤 Share & Export