CVE-2025-20625

7.4 HIGH

📋 TL;DR

An improper conditions check in Intel PROSet/Wireless WiFi Software for Windows allows unauthenticated attackers on adjacent networks to potentially cause denial of service. This affects Windows systems with vulnerable Intel WiFi drivers before version 23.110.0.5. The vulnerability requires physical proximity to the target network.

💻 Affected Systems

Products:
  • Intel(R) PROSet/Wireless WiFi Software for Windows
Versions: All versions before 23.110.0.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel WiFi adapters using vulnerable driver versions. Requires attacker to be on adjacent network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete WiFi service disruption on affected systems, requiring system reboot to restore connectivity.

🟠

Likely Case

Temporary WiFi connectivity loss on targeted devices, potentially affecting multiple systems on the same network segment.

🟢

If Mitigated

Limited impact with proper network segmentation and updated drivers.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Exploitable from adjacent internal networks, could affect WiFi availability in office environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Intel advisory states 'may allow' suggesting theoretical exploitability. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.110.0.5 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01292.html

Restart Required: Yes

Instructions:

1. Download latest Intel PROSet/Wireless WiFi Software from Intel Driver & Support Assistant or Intel website. 2. Run installer. 3. Restart system when prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate WiFi networks from other network segments to limit adjacent access

Disable WiFi When Not Needed

windows

Turn off WiFi adapters on critical systems when wireless connectivity is not required

netsh interface set interface "Wi-Fi" admin=disable

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WiFi networks
  • Monitor for unusual WiFi disconnection events and investigate adjacent network traffic

🔍 How to Verify

Check if Vulnerable:

Check Intel PROSet/Wireless WiFi Software version in Windows Device Manager under Network adapters > Intel(R) WiFi adapter > Driver tab

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%intel%wifi%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version is 23.110.0.5 or higher in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • Multiple WiFi disconnection events
  • Driver crash events in Windows Event Log (System log)

Network Indicators:

  • Unusual broadcast/multicast traffic on WiFi segments
  • Suspicious adjacent network scanning

SIEM Query:

EventID=1001 OR EventID=6008 OR (EventLog=System AND Source="e1dexpress" AND EventID=27)

🔗 References

📤 Share & Export