Skip to main content

CVE-2025-24511: Information Disclosure in Intel(R) I350 Series Ethernet

Low
VulnerabilityCVE-2025-24511cvecve-2025-24511
Published: Tue Aug 12 2025 (08/12/2025, 16:59:02 UTC)
Source: CVE Database V5
Product: Intel(R) I350 Series Ethernet

Description

Improper initialization in the Linux kernel-mode driver for some Intel(R) I350 Series Ethernet before version 5.19.2 may allow an authenticated user to potentially enable Information disclosure via data exposure.

AI-Powered Analysis

AILast updated: 08/20/2025, 01:43:47 UTC

Technical Analysis

CVE-2025-24511 is a vulnerability identified in the Linux kernel-mode driver for Intel(R) I350 Series Ethernet controllers, affecting versions prior to 5.19.2. The issue stems from improper initialization within the driver code, which may allow an authenticated user with low privileges to cause information disclosure through unintended data exposure. Specifically, the flaw does not require user interaction but does require the attacker to have local authenticated access to the system. The vulnerability is categorized as an information disclosure flaw, meaning that sensitive data could be exposed to unauthorized users, potentially leaking system or network information that could aid further attacks. The CVSS 4.0 base score is 2.0, indicating a low severity level, primarily because exploitation requires local privileges and the impact on confidentiality is limited. There is no indication of known exploits in the wild at the time of publication, and no patches or mitigation links were provided in the source data. The vulnerability affects Linux kernel versions before 5.19.2 that include the vulnerable Intel I350 Ethernet driver, which is commonly used in enterprise-grade network interface cards (NICs) for servers and workstations. The improper initialization likely leads to residual or uninitialized memory being exposed, which could contain sensitive information from kernel or network buffers. While the vulnerability does not affect integrity or availability, the confidentiality impact could be leveraged in targeted attacks to gather intelligence about the system or network environment.

Potential Impact

For European organizations, the impact of CVE-2025-24511 is primarily related to the confidentiality of sensitive information on systems using Intel I350 Ethernet controllers with vulnerable Linux kernel drivers. Organizations that rely on these NICs in their server infrastructure, especially those running Linux kernels prior to 5.19.2, could face risks of data leakage if an attacker gains authenticated local access. This could be particularly concerning in environments with multi-tenant servers, shared hosting, or where insider threats exist. Although the vulnerability is low severity and requires local privileges, it could be used as a stepping stone in a broader attack chain, especially in critical infrastructure, financial institutions, or government agencies where network interface data might reveal sensitive operational details. The lack of known exploits and the requirement for authenticated access limit the immediate risk, but organizations should not disregard the potential for information exposure that could facilitate more sophisticated attacks. Additionally, the vulnerability could impact compliance with data protection regulations such as GDPR if sensitive personal or business data is exposed.

Mitigation Recommendations

To mitigate CVE-2025-24511, European organizations should prioritize updating their Linux kernel to version 5.19.2 or later, where the vulnerability has been addressed. If immediate kernel upgrades are not feasible, organizations should restrict local access to systems with affected Intel I350 Ethernet controllers, enforcing strict access controls and monitoring for unauthorized login attempts. Implementing robust user authentication and privilege management policies will reduce the risk of exploitation. Network segmentation can limit the exposure of vulnerable systems to only trusted users. Additionally, organizations should audit their systems to identify the presence of Intel I350 NICs and verify kernel versions. Employing host-based intrusion detection systems (HIDS) to monitor for suspicious activities related to local user access can provide early warning signs. Finally, maintaining up-to-date security patches and regularly reviewing vendor advisories will help ensure timely response to emerging threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-02-04T04:00:22.159Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad0034933a

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/20/2025, 1:43:47 AM

Last updated: 9/26/2025, 1:22:08 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats