Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24851: Denial of Service in 100GbE Intel(R) Ethernet Controller E810

0
Medium
VulnerabilityCVE-2025-24851cvecve-2025-24851
Published: Tue Feb 10 2026 (02/10/2026, 16:25:16 UTC)
Source: CVE Database V5
Product: 100GbE Intel(R) Ethernet Controller E810

Description

Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version cvl fw 1.7.8.x within Ring 0: Bare Metal OS may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

AI-Powered Analysis

AILast updated: 02/10/2026, 17:02:45 UTC

Technical Analysis

CVE-2025-24851 identifies a denial of service vulnerability in the firmware of Intel's 100GbE Ethernet Controller E810, specifically in firmware versions before cvl fw 1.7.8.x. The vulnerability is caused by an uncaught exception within the firmware operating at Ring 0 privilege level on Bare Metal OS platforms. This low complexity attack can be triggered by a system software adversary possessing privileged user access, requiring local access but no user interaction or special internal knowledge. The flaw leads to a denial of service condition, severely impacting the availability of the affected system. Confidentiality and integrity remain unaffected. The vulnerability is rated medium severity with a CVSS 4.0 score of 6.0, reflecting its local attack vector (AV:L), low attack complexity (AC:L), no required authentication (PR:H), no user interaction (UI:N), and high impact on availability (VA:H). No known exploits have been reported in the wild, but the vulnerability poses a risk to environments relying on Intel E810 controllers for high-speed networking, especially in data centers and enterprise bare metal deployments. The lack of patch links suggests that mitigation relies on firmware updates from Intel, specifically upgrading to version 1.7.8.x or later.

Potential Impact

For European organizations, this vulnerability could disrupt critical network infrastructure relying on Intel 100GbE Ethernet Controller E810 hardware, particularly in data centers, cloud providers, and enterprises with high-speed networking needs. The denial of service condition could lead to network outages, degraded performance, or service interruptions impacting business continuity and operational efficiency. While confidentiality and integrity are not compromised, availability impacts can affect customer-facing services, internal communications, and data transfer processes. Organizations with bare metal OS deployments and privileged local users are at higher risk. The medium severity rating indicates a moderate threat level, but the potential for disruption in high-throughput environments elevates the operational risk. Given the local access requirement, insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

European organizations should immediately inventory their network infrastructure to identify Intel 100GbE Ethernet Controller E810 devices running vulnerable firmware versions prior to cvl fw 1.7.8.x. Coordinate with Intel or hardware vendors to obtain and deploy the latest firmware updates that address this vulnerability. Restrict privileged user access to trusted personnel and implement strict access controls to minimize the risk of local exploitation. Employ monitoring and alerting for unusual system software behavior or network disruptions that may indicate attempted exploitation. Consider network segmentation to isolate critical infrastructure and reduce the attack surface. Regularly review and update security policies governing privileged account management and firmware update procedures. Engage with Intel support channels for any additional mitigation guidance or patches. As no user interaction is required, focus on securing local administrative environments and enforcing least privilege principles. Maintain backups and incident response plans to quickly recover from potential denial of service events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
intel
Date Reserved
2025-03-11T03:00:20.604Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b5d5c4b57a58fa119cf10

Added to database: 2/10/2026, 4:31:24 PM

Last enriched: 2/10/2026, 5:02:45 PM

Last updated: 2/21/2026, 12:22:14 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats