CVE-2025-35963

7.4 HIGH

📋 TL;DR

A vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows unprivileged local users to cause denial of service via adjacent network access. This affects systems running vulnerable versions of Intel wireless drivers, potentially disrupting WiFi connectivity and system availability.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless WiFi Software for Windows
Versions: All versions before 23.160
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel wireless adapters using vulnerable driver versions. Requires attacker on same network segment.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of WiFi connectivity and potential system instability requiring reboot, affecting availability of network-dependent services.

🟠

Likely Case

Temporary WiFi service disruption affecting local users on the same network segment, requiring driver restart or system reboot.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated drivers, limited to isolated network segments.

🌐 Internet-Facing: LOW - Requires local network access, not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Exploitable by unprivileged users on the same network segment, but requires specific driver version.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires adjacent network access but no authentication or user interaction. Low complexity attack according to CVSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.160 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant from Intel website. 2. Run the tool to detect vulnerable drivers. 3. Follow prompts to update to version 23.160 or later. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vulnerable systems on separate network segments to limit attack surface

Disable Vulnerable Adapter

windows

Temporarily disable Intel wireless adapter if not critical

netsh interface set interface "Wi-Fi" admin=disable

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Monitor for unusual network traffic patterns and WiFi service disruptions

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under Network adapters > Intel(R) Wireless adapter > Driver tab

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%Intel%Wireless%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version is 23.160 or higher in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • Unexpected WiFi adapter resets
  • Driver crash events in Windows Event Log
  • System logs showing network connectivity loss

Network Indicators:

  • Unusual broadcast/multicast traffic patterns
  • ARP spoofing attempts on local segment

SIEM Query:

EventID=1001 OR EventID=1000 Source="Intel Wireless Driver" OR "WiFi service stopped unexpectedly"

🔗 References

📤 Share & Export