CVE-2024-39797

6.5 MEDIUM

📋 TL;DR

An improper access control vulnerability in Intel Ethernet Connection I219 Series drivers allows authenticated local users to potentially cause denial of service. This affects systems with vulnerable driver versions installed, requiring local access to exploit. The vulnerability stems from insufficient access restrictions in the driver.

💻 Affected Systems

Products:
  • Intel Ethernet Connection I219 Series drivers
Versions: All versions before 12.19.1.39
Operating Systems: Windows, Linux, Other OS with affected drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel I219 Series network adapter with vulnerable driver. Systems without this hardware are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or kernel panic requiring physical reboot, potentially causing data loss or service disruption.

🟠

Likely Case

Local denial of service affecting network connectivity or system stability for the affected user session.

🟢

If Mitigated

Minimal impact with proper access controls and patched systems, limited to authorized user actions.

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local authenticated users could disrupt systems, but requires specific driver configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and specific driver interaction. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.19.1.39 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00590.html

Restart Required: Yes

Instructions:

1. Download updated driver from Intel website. 2. Uninstall current driver. 3. Install new driver version 12.19.1.39+. 4. Reboot system.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user privileges to reduce attack surface

Disable affected network adapter

all

Temporarily disable I219 Series adapter if not critical

Windows: netsh interface set interface "Ethernet" admin=disable
Linux: sudo ip link set dev eth0 down

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor systems for unusual driver activity or system crashes

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager (Windows) or via lspci -v (Linux) for I219 adapter driver version.

Check Version:

Windows: Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*I219*'} | Select-Object DeviceName, DriverVersion

Verify Fix Applied:

Confirm driver version is 12.19.1.39 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • System crash logs
  • Driver error events
  • Unexpected system reboots

Network Indicators:

  • Sudden network interface failures
  • Abnormal driver activity

SIEM Query:

EventID=41 OR (Source='System' AND EventID=6008) OR (Source='e1dexpress' AND EventID=27)

🔗 References

📤 Share & Export