VYPR
Low severity3.4NVD Advisory· Published Nov 13, 2024· Updated Apr 15, 2026

CVE-2024-33611

CVE-2024-33611

Description

Improper input validation for some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow a privileged user to potentially enable denial of service via local access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A low-severity denial of service vulnerability in Intel PROSet/Wireless WiFi software due to improper input validation, exploitable locally by a privileged user.

Vulnerability

Overview

CVE-2024-33611 is an improper input validation vulnerability in some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60. The flaw may allow a privileged user to trigger a denial of service condition via local access [1].

Exploitation

To exploit this vulnerability, an attacker needs local access to the system and elevated privileges. The attack vector is local, meaning the attacker must already have a foothold on the machine or be able to log in with sufficient rights. No user interaction beyond initial access is required [1].

Impact

A successful exploitation could cause a denial of service, potentially affecting the availability of the WiFi software or related system services. The CVSS v3 base score is 3.4 (Low), indicating limited impact [1].

Mitigation

Intel has addressed this vulnerability in version 23.60 of the PROSet/Wireless WiFi software for Windows. Users are advised to update to this or a later version to mitigate the risk [1].

References
  1. INTEL-SA-01167

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.