VYPR
High severity7.4NVD Advisory· Published Nov 11, 2025· Updated Apr 15, 2026

CVE-2025-33029

CVE-2025-33029

Description

Out-of-bounds write for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (high) impacts.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An out-of-bounds write in Intel PROSet/Wireless WiFi drivers (before 23.160) allows an adjacent unauthenticated attacker to cause denial of service.

Vulnerability

Overview

CVE-2025-33029 describes an out-of-bounds write vulnerability in Intel(R) PROSet/Wireless WiFi Software for Windows, affecting versions prior to 23. The issue resides within Ring 2: Device Drivers, indicating a flaw in kernel-mode driver code that handles wireless operations. The root cause is a lack of proper bounds checking when processing certain inputs, leading to a write operation that exceeds the allocated memory buffer [1].

Exploitation

Conditions

An unprivileged software adversary can exploit this vulnerability without authentication, requiring only adjacent network access (e.g., within Wi-Fi range). The attack complexity is low, and no user interaction is needed. The attacker does not require special internal knowledge of the target system, making the attack vector accessible to a wide range of threat actors [1].

Impact

Successful exploitation results in a denial of service (DoS) condition, impacting system availability with high severity. The vulnerability does not affect confidentiality or integrity, as the out-of-bounds write is limited to causing a crash or hang rather than data corruption or disclosure. The CVSS v3 base score is 7.4 (High), reflecting the ease of exploitation and the significant availability impact [1].

Mitigation

Intel has addressed this vulnerability in PROSet/Wireless WiFi Software version 23.160 and later. Users are advised to update their drivers to the latest version available through Intel's support channels or Windows Update. No workarounds are documented, and the vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog [1].

References
  1. INTEL-SA-01398

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.