CVE-2025-24303

7.8 HIGH

📋 TL;DR

This vulnerability in Intel 800 Series Ethernet drivers allows authenticated local users to escalate privileges due to improper condition checking. It affects Linux systems using vulnerable Intel Ethernet hardware drivers. Attackers with local access could gain root privileges on affected systems.

💻 Affected Systems

Products:
  • Intel 800 Series Ethernet Controllers
  • Systems with Intel Ethernet 800 Series hardware
Versions: Linux kernel-mode driver versions before 1.17.2
Operating Systems: Linux distributions using affected Intel Ethernet drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel 800 Series Ethernet hardware and vulnerable driver versions. Requires local authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, allowing complete control over the affected system, data theft, and lateral movement.

🟠

Likely Case

Local privilege escalation from a standard user account to root, enabling installation of malware, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and monitoring detects unusual privilege escalation attempts.

🌐 Internet-Facing: LOW (requires local authenticated access, not remotely exploitable)
🏢 Internal Only: HIGH (local authenticated users can exploit this for privilege escalation)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of driver exploitation techniques. No public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.17.2 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html

Restart Required: Yes

Instructions:

1. Check current driver version with 'ethtool -i <interface> | grep version'. 2. Update Intel Ethernet driver to version 1.17.2 or later via package manager. 3. Reboot system to load new driver.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit local user accounts to trusted personnel only and implement strict access controls

Disable affected hardware

linux

Temporarily disable Intel 800 Series Ethernet interfaces if not critical

sudo ip link set <interface> down

🧯 If You Can't Patch

  • Implement strict local user access controls and monitoring
  • Use SELinux/AppArmor to restrict driver access and privilege escalation paths

🔍 How to Verify

Check if Vulnerable:

Run 'ethtool -i <interface_name> | grep version' and check if version is below 1.17.2 for Intel 800 Series Ethernet interfaces

Check Version:

ethtool -i <interface_name> | grep version

Verify Fix Applied:

After update, verify driver version is 1.17.2 or higher with 'ethtool -i <interface> | grep version'

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Failed driver operations in kernel logs
  • Suspicious access to /dev/mem or driver interfaces

Network Indicators:

  • None (local exploit only)

SIEM Query:

source="kernel" AND ("privilege escalation" OR "driver fault" OR "Intel Ethernet")

🔗 References

📤 Share & Export