Intel has issued patches for three vulnerabilities for its wireless hardware and software.Two problems affect certain versions of its Pro/Wireless Network Connection Hardware, part of its Centrino mobile platform, Intel said. The vulnerabilities lie in drivers from Microsoft, Intel said.The flaws could allow an attacker near a Wi-Fi station to run unauthorized code on a victim’s machine or gain kernel-level privileges.A third vulnerability affects Intel’s Proset/Wireless Software. It could lead to a hacker obtaining authentication credentials, Intel said. So far, no attempts have been made to exploit the vulnerabilities, Intel said.Graham Cluley, senior technology consultant for security vendor Sophos, said a hacker could use the driver problems to create a worm that replicates itself by passing to other computers over a Wi-Fi network. “It’s a very big target for people to do these sorts of things,” Cluley said.Users can verify what version of the hardware they are running here. The new drivers can be downloaded here.Intel cautioned, however, that the updated drivers are generic ones and that original equipment manufacturers may have changed some of the software. The generic drivers have not been verified by manufacturers for compatibility, Intel said.For the other vulnerability, Intel recommended saving the profile of the Proset/Wireless Software with the “export” feature before making changes.The SANS Institute, a security training organization, said in an advisory it does not believe updated drivers would be delivered through Microsoft’s automated update system. Microsoft officials could not be immediately reached.SANS also advised that users should check with system vendors to see if custom drivers are going to be released. The patches will have to be applied manually unless manufacturers provide an automated update tool, SANS said. By Jeremy Kirk, IDG News Service (London Bureau) Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe