CVE-2025-35967

7.4 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows unprivileged attackers on the same network to cause denial of service. This affects systems running vulnerable versions of the Intel wireless driver. The vulnerability requires no authentication or user interaction to exploit.

💻 Affected Systems

Products:
  • Intel PROSet/Wireless WiFi Software for Windows
Versions: All versions before 23.160
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel wireless adapters using the vulnerable driver version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or persistent denial of service requiring physical intervention to restore wireless functionality.

🟠

Likely Case

Temporary wireless connectivity loss requiring driver restart or system reboot.

🟢

If Mitigated

No impact if patched or if wireless adapter is disabled.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly internet exploitable.
🏢 Internal Only: HIGH - Any user on the same network segment can trigger denial of service without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires adjacent network access but no authentication or user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.160 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant from Intel website. 2. Run the tool to detect vulnerable driver. 3. Follow prompts to update to version 23.160 or later. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Disable Wireless Adapter

windows

Temporarily disable the Intel wireless adapter to prevent exploitation.

netsh interface set interface "Wi-Fi" admin=disable

Network Segmentation

all

Isolate vulnerable systems on separate VLANs to limit adjacent network access.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit adjacent access to vulnerable systems
  • Monitor for wireless connectivity issues and driver crashes as potential exploitation indicators

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under Network adapters > Intel(R) Wireless adapter > Driver tab.

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%Intel%Wireless%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version is 23.160 or higher in Device Manager.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing wireless adapter driver crashes (Event ID 1001)
  • System logs showing unexpected wireless disconnections

Network Indicators:

  • Unusual broadcast/multicast traffic targeting wireless driver ports
  • Sudden loss of wireless connectivity across multiple systems

SIEM Query:

EventID=1001 AND Source="Windows Error Reporting" AND Description="*Intel*Wireless*"

🔗 References

📤 Share & Export