CVE-2025-24851

6.0 MEDIUM

📋 TL;DR

An uncaught exception in Intel E810 100GbE Ethernet controller firmware allows privileged local attackers to cause denial of service. This affects systems using these controllers with firmware before version cvl fw 1.7.8.x running on Bare Metal OS. The vulnerability requires local access and privileged user credentials.

💻 Affected Systems

Products:
  • Intel Ethernet Controller E810 100GbE
Versions: All firmware versions before cvl fw 1.7.8.x
Operating Systems: Bare Metal OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the specific Intel E810 controller with vulnerable firmware on Bare Metal OS. Virtualized environments or other OSes are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or unavailability of network services through the affected controller, requiring physical intervention to restore functionality.

🟠

Likely Case

Temporary disruption of network connectivity through the affected Ethernet controller, potentially requiring system reboot to restore normal operation.

🟢

If Mitigated

Minimal impact if proper access controls limit privileged user access and systems are monitored for unusual activity.

🌐 Internet-Facing: LOW - Requires local privileged access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal privileged users could intentionally or accidentally trigger the denial of service condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local privileged access. The advisory describes it as low complexity attack that doesn't require special internal knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: cvl fw 1.7.8.x or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01171.html

Restart Required: Yes

Instructions:

1. Download updated firmware from Intel's support site. 2. Follow Intel's firmware update procedures for the E810 controller. 3. Reboot the system to load the new firmware.

🔧 Temporary Workarounds

Restrict privileged access

all

Limit local administrative access to systems with vulnerable firmware to trusted personnel only.

Network redundancy

all

Implement redundant network paths using unaffected controllers to maintain connectivity if one controller fails.

🧯 If You Can't Patch

  • Implement strict access controls to limit who has privileged access to affected systems
  • Monitor systems for unusual activity and implement network redundancy to mitigate impact

🔍 How to Verify

Check if Vulnerable:

Check current firmware version using Intel's Ethernet diagnostic tools or system management utilities.

Check Version:

Use Intel's 'ethtool -i <interface>' or system-specific firmware query tools

Verify Fix Applied:

Verify firmware version shows cvl fw 1.7.8.x or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Network interface failures
  • Firmware exception logs

Network Indicators:

  • Sudden loss of connectivity on affected interfaces
  • Network traffic anomalies

SIEM Query:

Search for: (event_type:system_crash OR event_type:interface_down) AND (device_model:E810 OR firmware_version:<1.7.8)

🔗 References

📤 Share & Export