Intel has issued patches for three vulnerabilities for its wireless hardware and software.Two problems affect certain versions of its Pro/Wireless Network Connection Hardware, part of its Centrino mobile platform, Intel said. The vulnerabilities lie in drivers from Microsoft, Intel said.The flaws could allow an attacker near a Wi-Fi station to run unauthorized code on a victim’s machine or gain kernel-level privileges.A third vulnerability affects Intel’s Proset/Wireless Software. It could lead to a hacker obtaining authentication credentials, Intel said. So far, no attempts have been made to exploit the vulnerabilities, Intel said.Graham Cluley, senior technology consultant for security vendor Sophos, said a hacker could use the driver problems to create a worm that replicates itself by passing to other computers over a Wi-Fi network. “It’s a very big target for people to do these sorts of things,” Cluley said.Users can verify what version of the hardware they are running here. The new drivers can be downloaded here.Intel cautioned, however, that the updated drivers are generic ones and that original equipment manufacturers may have changed some of the software. The generic drivers have not been verified by manufacturers for compatibility, Intel said.For the other vulnerability, Intel recommended saving the profile of the Proset/Wireless Software with the “export” feature before making changes.The SANS Institute, a security training organization, said in an advisory it does not believe updated drivers would be delivered through Microsoft’s automated update system. Microsoft officials could not be immediately reached.SANS also advised that users should check with system vendors to see if custom drivers are going to be released. The patches will have to be applied manually unless manufacturers provide an automated update tool, SANS said. By Jeremy Kirk, IDG News Service (London Bureau)Keep checking in at our Security Feed for updated news coverage. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe