CVE-2025-31146

6.1 MEDIUM

📋 TL;DR

A time-of-check time-of-use race condition vulnerability in Intel Ethernet Adapter Complete Driver Pack software before version 1.5.1.0 allows unprivileged user applications to cause denial of service. This affects systems with vulnerable Intel Ethernet adapter drivers installed, requiring an authenticated user with local access to exploit.

💻 Affected Systems

Products:
  • Intel Ethernet Adapter Complete Driver Pack software
Versions: All versions before 1.5.1.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel Ethernet adapter with vulnerable driver installed. User must have local authenticated access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system denial of service requiring reboot, potentially disrupting critical network-dependent services.

🟠

Likely Case

Local denial of service affecting network connectivity for the targeted system, requiring administrative intervention to restore.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges and network segmentation.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Internal users with local access could disrupt network connectivity on vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access and local execution. Race condition exploitation requires precise timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.1.0 or later

Vendor Advisory: https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01376.html

Restart Required: Yes

Instructions:

1. Download Intel Ethernet Adapter Complete Driver Pack version 1.5.1.0 or later from Intel website. 2. Run installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict local user privileges

all

Limit standard user privileges to reduce attack surface for local exploitation.

Network segmentation

all

Isolate systems with vulnerable drivers from critical network segments.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges on affected systems
  • Monitor for unusual network disruption events and implement network redundancy

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager (Windows) or via 'ethtool -i <interface>' (Linux) and compare to vulnerable versions.

Check Version:

Windows: Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*Intel*Ethernet*'} | Select-Object DeviceName, DriverVersion; Linux: ethtool -i <interface_name> | grep version

Verify Fix Applied:

Verify driver version is 1.5.1.0 or later after update and restart.

📡 Detection & Monitoring

Log Indicators:

  • System crash logs
  • Network interface reset events
  • Unexpected driver reloads

Network Indicators:

  • Sudden loss of network connectivity on specific hosts
  • ARP/MAC address flapping

SIEM Query:

EventID: 6008 OR (Source: 'System' AND EventID: 41) OR (Source: 'e1dexpress' OR 'e1d' in Windows logs)

🔗 References

📤 Share & Export