The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-0558

CVE-2020-0558: Intel PROSet/Wireless WiFi DoS Vulnerability

CVE-2020-0558 is a denial of service flaw in Intel PROSet/Wireless WiFi caused by improper buffer restrictions in the kernel mode driver. This article covers the technical details, affected versions, and mitigation.

Updated: May 16, 2026

CVE-2020-0558 Overview

CVE-2020-0558 is a medium-severity vulnerability affecting Intel PROSet/Wireless WiFi products on Windows 10. Improper buffer restrictions in the kernel mode driver allow an unprivileged user on an adjacent network to trigger a denial of service condition. The flaw impacts a wide range of Intel wireless adapters, including Wi-Fi 6 AX200/AX201 and several Wireless-AC families. Intel addressed the issue in PROSet/Wireless WiFi software version 21.70.

Critical Impact

An attacker within wireless range can crash the wireless driver and disrupt host availability without authentication or user interaction.

Affected Products

  • Intel PROSet/Wireless WiFi software versions prior to 21.70 on Windows 10
  • Intel Wi-Fi 6 AX200 and AX201 wireless adapters
  • Intel Wireless-AC 9260, 9461, 9462, 9560 and Dual Band Wireless-AC 8260, 8265, 3165, 3168, 7265 (Rev D)

Discovery Timeline

  • 2020-04-15 - CVE-2020-0558 published to the National Vulnerability Database
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-0558

Vulnerability Analysis

The vulnerability resides in the kernel mode driver shipped with Intel PROSet/Wireless WiFi software for Windows 10. The driver fails to enforce proper buffer restrictions when processing data received over the wireless interface. An attacker on an adjacent network can supply crafted frames that exceed expected buffer boundaries handled by the driver.

Because the affected code runs in kernel space, improperly bounded memory operations cause the driver to enter an unrecoverable state. The result is a denial of service condition affecting the wireless stack or the host operating system. The CWE classification is recorded by NVD as NVD-CWE-noinfo, reflecting limited public detail from the vendor advisory.

Root Cause

The root cause is improper buffer restrictions within the kernel mode wireless driver. The driver does not adequately validate the size or boundaries of data structures it processes from over-the-air input. This category of flaw aligns with driver vulnerabilities where missing length checks lead to memory corruption or fatal driver faults.

Attack Vector

Exploitation requires adjacent network access, meaning the attacker must be within wireless radio range of a vulnerable host. No authentication or user interaction is required. The attack does not yield code execution or data disclosure based on the published impact; confidentiality and integrity are unaffected, while availability is high impact. Successful exploitation typically results in a driver crash, system bug check, or loss of wireless connectivity.

No public proof-of-concept code or exploit module is currently available for CVE-2020-0558, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog.

Detection Methods for CVE-2020-0558

Indicators of Compromise

  • Unexpected Windows bug checks or blue screen events referencing Intel wireless driver modules such as Netwtw0*.sys or related Netwbw*.sys binaries
  • Repeated Wi-Fi adapter disconnects, reset events, or driver restarts in Windows Event Log around the time of suspicious wireless activity
  • Anomalous 802.11 management or data frames observed in wireless captures from hosts within radio range

Detection Strategies

  • Inventory endpoints running Intel PROSet/Wireless WiFi software and compare installed versions against the fixed release of 21.70 or later
  • Monitor Windows kernel crash dumps and Reliability Monitor for repeated wireless driver faults on systems with affected adapters
  • Correlate wireless adapter reset events with proximity-based threat activity using endpoint telemetry

Monitoring Recommendations

  • Forward Windows System and Application event logs, along with WHEA-Logger and Kernel-Power events, to a centralized logging platform for review
  • Track driver version and adapter model fields across the fleet to detect unpatched hosts
  • Alert on patterns of repeated wireless disconnects affecting multiple hosts in the same physical location

How to Mitigate CVE-2020-0558

Immediate Actions Required

  • Update Intel PROSet/Wireless WiFi software to version 21.70 or later on all Windows 10 systems with affected adapters
  • Identify and prioritize laptops and mobile endpoints that operate in untrusted wireless environments
  • Validate patch deployment by confirming the installed driver version after reboot

Patch Information

Intel released fixed software in PROSet/Wireless WiFi version 21.70. Refer to the Intel Security Advisory SA-00338 for vendor-supplied download links and detailed version guidance for each adapter model.

Workarounds

  • Disable the wireless adapter on systems that cannot be patched immediately, especially in high-risk environments
  • Restrict use of vulnerable hosts to wired connections or trusted wireless networks until the driver is updated
  • Limit physical proximity exposure by avoiding untrusted public Wi-Fi locations on unpatched devices

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechIntel Proset Wireless Wifi

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.47%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Intel Security Advisory SA-00338
  • Related CVEs
  • CVE-2020-0557: Intel PROSet/Wireless WiFi Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English