CVE-2024-36274

6.5 MEDIUM

📋 TL;DR

An out-of-bounds write vulnerability in Intel 800 Series Ethernet drivers allows unauthenticated attackers on the same network segment to potentially cause denial of service. This affects systems using Intel Ethernet Adapter Complete Driver Pack versions before 29.1. The vulnerability requires adjacent network access to exploit.

💻 Affected Systems

Products:
  • Intel(R) 800 Series Ethernet Driver
  • Intel(R) Ethernet Adapter Complete Driver Pack
Versions: All versions before 29.1
Operating Systems: Windows, Linux, VMware ESXi
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel 800 Series Ethernet adapters using vulnerable driver versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or kernel panic requiring physical reboot, potentially disrupting critical network services.

🟠

Likely Case

Network interface driver crash causing temporary network disruption until driver reloads or system restarts.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated drivers.

🌐 Internet-Facing: LOW - Requires adjacent network access, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Exploitable from same network segment, could disrupt internal services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires crafting specific network packets and adjacent network access. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 29.1 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html

Restart Required: Yes

Instructions:

1. Download driver version 29.1 or later from Intel website. 2. Uninstall current driver. 3. Install updated driver. 4. Reboot system.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate systems with vulnerable drivers using VLANs or firewalls to prevent adjacent access.

Disable Unused Interfaces

windows

Disable Intel 800 Series Ethernet interfaces not in use to reduce attack surface.

netsh interface set interface "Ethernet" admin=disable

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Monitor network traffic for abnormal patterns targeting Ethernet drivers

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager (Windows) or 'ethtool -i <interface>' (Linux). If version is below 29.1, system is vulnerable.

Check Version:

Windows: 'wmic path win32_pnpentity get caption,driverVersion' | findstr "Intel.*800". Linux: 'ethtool -i <interface_name>' | grep version

Verify Fix Applied:

Verify driver version is 29.1 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Driver crash/restart events
  • System event logs showing network interface failures

Network Indicators:

  • Unusual broadcast/multicast traffic patterns
  • Malformed Ethernet packets targeting driver

SIEM Query:

EventID=6008 OR "kernel panic" OR "driver crash" AND "Intel.*800"

🔗 References

📤 Share & Export