CVE-2025-35971
📋 TL;DR
An out-of-bounds write vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows unprivileged local attackers to cause denial of service. The vulnerability affects systems with vulnerable Intel WiFi drivers installed, requiring only adjacent network access and no user interaction. This could crash affected systems or WiFi functionality.
💻 Affected Systems
- Intel PROSet/Wireless WiFi Software for Windows
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or persistent WiFi driver failure requiring system reboot
Likely Case
Temporary WiFi service disruption affecting network connectivity
If Mitigated
Minimal impact with proper network segmentation and updated drivers
🎯 Exploit Status
Attack requires adjacent network access but no authentication or user interaction
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 23.160 or later
Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01398.html
Restart Required: Yes
Instructions:
1. Download Intel PROSet/Wireless WiFi Software version 23.160 or later from Intel's website. 2. Run the installer with administrative privileges. 3. Restart the system when prompted.
🔧 Temporary Workarounds
Disable vulnerable WiFi adapter
windowsTemporarily disable the Intel WiFi adapter to prevent exploitation
netsh interface set interface "Wi-Fi" admin=disable
Network segmentation
allIsolate vulnerable systems from untrusted network segments
🧯 If You Can't Patch
- Implement strict network segmentation to limit adjacent access
- Monitor for unusual WiFi driver crashes or system instability
🔍 How to Verify
Check if Vulnerable:
Check Intel PROSet/Wireless WiFi Software version in Windows Device Manager under Network adapters > Intel(R) Wireless... > Driver tab
Check Version:
wmic path win32_pnpentity where "caption like '%Intel%Wireless%'" get caption, driverVersion
Verify Fix Applied:
Verify driver version is 23.160 or higher in Device Manager
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs: System crashes, driver failures (Event ID 1001, 41)
- Application logs: Intel WiFi driver errors
Network Indicators:
- Sudden WiFi disconnections from multiple systems
- Unusual network traffic patterns targeting WiFi management frames
SIEM Query:
EventID=1001 OR EventID=41 AND Source="Intel(R) Wireless" OR ProcessName contains "IntelWiFi"