CVE-2025-30255

8.2 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows unprivileged attackers to cause denial of service. The vulnerability affects systems running affected versions of the Intel wireless driver software on Windows. Attackers on the same network segment can potentially crash systems without authentication or user interaction.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless WiFi Software for Windows
Versions: All versions before 23.160
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel wireless adapters using the vulnerable driver software.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or instability requiring physical reboot, potentially disrupting critical operations on affected devices.

🟠

Likely Case

WiFi driver crash causing network connectivity loss until driver restart or system reboot.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing adjacent network attacks.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Unauthenticated attackers on the same network segment can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Intel advisory indicates low complexity attack with no authentication required from adjacent network position.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.160 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant or visit Intel Download Center. 2. Check for wireless driver updates. 3. Install version 23.160 or newer. 4. Restart system to complete installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate wireless networks from critical systems and implement strict network access controls.

Disable Vulnerable Adapter

windows

Temporarily disable Intel wireless adapter if not required, using wired connection instead.

netsh interface set interface "Wi-Fi" admin=disable

🧯 If You Can't Patch

  • Implement strict network segmentation to prevent adjacent network attacks
  • Deploy network monitoring for unusual WiFi driver crashes or denial of service attempts

🔍 How to Verify

Check if Vulnerable:

Check Intel wireless driver version in Device Manager under Network adapters > Intel(R) Wireless... properties > Driver tab.

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%Intel%Wireless%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version is 23.160 or higher in Device Manager and system remains stable during network operations.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing WiFi adapter crashes (Event ID 1001)
  • System crashes or blue screens related to netwtwXX.sys or similar Intel wireless drivers

Network Indicators:

  • Unusual network traffic patterns targeting wireless driver ports
  • Multiple connection attempts from adjacent network devices

SIEM Query:

EventID=1001 AND Source="Windows Error Reporting" AND Description="*netwtw*" OR Description="*Intel*Wireless*"

🔗 References

📤 Share & Export