CVE-2024-36274
📋 TL;DR
An out-of-bounds write vulnerability in Intel 800 Series Ethernet drivers allows unauthenticated attackers on the same network segment to potentially cause denial of service. This affects systems using Intel Ethernet Adapter Complete Driver Pack versions before 29.1. The vulnerability requires adjacent network access to exploit.
💻 Affected Systems
- Intel(R) 800 Series Ethernet Driver
- Intel(R) Ethernet Adapter Complete Driver Pack
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or kernel panic requiring physical reboot, potentially disrupting critical network services.
Likely Case
Network interface driver crash causing temporary network disruption until driver reloads or system restarts.
If Mitigated
Minimal impact with proper network segmentation and updated drivers.
🎯 Exploit Status
Requires crafting specific network packets and adjacent network access. No public exploit code known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 29.1 or later
Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html
Restart Required: Yes
Instructions:
1. Download driver version 29.1 or later from Intel website. 2. Uninstall current driver. 3. Install updated driver. 4. Reboot system.
🔧 Temporary Workarounds
Network Segmentation
allIsolate systems with vulnerable drivers using VLANs or firewalls to prevent adjacent access.
Disable Unused Interfaces
windowsDisable Intel 800 Series Ethernet interfaces not in use to reduce attack surface.
netsh interface set interface "Ethernet" admin=disable
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable systems
- Monitor network traffic for abnormal patterns targeting Ethernet drivers
🔍 How to Verify
Check if Vulnerable:
Check driver version in Device Manager (Windows) or 'ethtool -i <interface>' (Linux). If version is below 29.1, system is vulnerable.
Check Version:
Windows: 'wmic path win32_pnpentity get caption,driverVersion' | findstr "Intel.*800". Linux: 'ethtool -i <interface_name>' | grep version
Verify Fix Applied:
Verify driver version is 29.1 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Driver crash/restart events
- System event logs showing network interface failures
Network Indicators:
- Unusual broadcast/multicast traffic patterns
- Malformed Ethernet packets targeting driver
SIEM Query:
EventID=6008 OR "kernel panic" OR "driver crash" AND "Intel.*800"