CVE-2025-23241

7.3 HIGH

📋 TL;DR

An integer overflow vulnerability in Intel 800 Series Ethernet kernel drivers allows authenticated local users to cause denial of service. This affects Linux systems using vulnerable Intel Ethernet drivers before version 1.17.2.

💻 Affected Systems

Products:
  • Intel 800 Series Ethernet Controllers
Versions: Linux kernel-mode driver versions before 1.17.2
Operating Systems: Linux distributions using affected Intel Ethernet drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel 800 Series Ethernet hardware and vulnerable driver versions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and complete unavailability of affected server

🟠

Likely Case

Local denial of service affecting network connectivity and system stability

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges

🌐 Internet-Facing: LOW (requires local authenticated access)
🏢 Internal Only: MEDIUM (internal users with local access could disrupt critical systems)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of driver interaction

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.17.2 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html

Restart Required: Yes

Instructions:

1. Check current driver version. 2. Update to Intel Ethernet driver 1.17.2 or later. 3. Reboot system to load new driver.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit local user privileges to reduce attack surface

# Review and restrict sudo privileges
# Implement least privilege access controls

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor systems for unusual driver behavior or crashes

🔍 How to Verify

Check if Vulnerable:

Check Intel Ethernet driver version: modinfo e1000e | grep version

Check Version:

modinfo e1000e | grep version

Verify Fix Applied:

Verify driver version is 1.17.2 or later: modinfo e1000e | grep version

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Driver crash messages in dmesg
  • Network interface failures

Network Indicators:

  • Sudden loss of network connectivity on affected interfaces

SIEM Query:

source="kernel" AND ("panic" OR "oops") AND "e1000e"

🔗 References

📤 Share & Export