CVE-2025-24851: Denial of Service in 100GbE Intel(R) Ethernet Controller E810
Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version cvl fw 1.7.8.x within Ring 0: Bare Metal OS may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
AI Analysis
Technical Summary
CVE-2025-24851 identifies a denial of service vulnerability in the firmware of Intel's 100GbE Ethernet Controller E810, specifically in firmware versions before cvl fw 1.7.8.x. The vulnerability is caused by an uncaught exception within the firmware operating at Ring 0 privilege level on Bare Metal OS platforms. This low complexity attack can be triggered by a system software adversary possessing privileged user access, requiring local access but no user interaction or special internal knowledge. The flaw leads to a denial of service condition, severely impacting the availability of the affected system. Confidentiality and integrity remain unaffected. The vulnerability is rated medium severity with a CVSS 4.0 score of 6.0, reflecting its local attack vector (AV:L), low attack complexity (AC:L), no required authentication (PR:H), no user interaction (UI:N), and high impact on availability (VA:H). No known exploits have been reported in the wild, but the vulnerability poses a risk to environments relying on Intel E810 controllers for high-speed networking, especially in data centers and enterprise bare metal deployments. The lack of patch links suggests that mitigation relies on firmware updates from Intel, specifically upgrading to version 1.7.8.x or later.
Potential Impact
For European organizations, this vulnerability could disrupt critical network infrastructure relying on Intel 100GbE Ethernet Controller E810 hardware, particularly in data centers, cloud providers, and enterprises with high-speed networking needs. The denial of service condition could lead to network outages, degraded performance, or service interruptions impacting business continuity and operational efficiency. While confidentiality and integrity are not compromised, availability impacts can affect customer-facing services, internal communications, and data transfer processes. Organizations with bare metal OS deployments and privileged local users are at higher risk. The medium severity rating indicates a moderate threat level, but the potential for disruption in high-throughput environments elevates the operational risk. Given the local access requirement, insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
European organizations should immediately inventory their network infrastructure to identify Intel 100GbE Ethernet Controller E810 devices running vulnerable firmware versions prior to cvl fw 1.7.8.x. Coordinate with Intel or hardware vendors to obtain and deploy the latest firmware updates that address this vulnerability. Restrict privileged user access to trusted personnel and implement strict access controls to minimize the risk of local exploitation. Employ monitoring and alerting for unusual system software behavior or network disruptions that may indicate attempted exploitation. Consider network segmentation to isolate critical infrastructure and reduce the attack surface. Regularly review and update security policies governing privileged account management and firmware update procedures. Engage with Intel support channels for any additional mitigation guidance or patches. As no user interaction is required, focus on securing local administrative environments and enforcing least privilege principles. Maintain backups and incident response plans to quickly recover from potential denial of service events.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Italy, Spain, Poland
CVE-2025-24851: Denial of Service in 100GbE Intel(R) Ethernet Controller E810
Description
Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version cvl fw 1.7.8.x within Ring 0: Bare Metal OS may allow a denial of service. System software adversary with a privileged user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
AI-Powered Analysis
Technical Analysis
CVE-2025-24851 identifies a denial of service vulnerability in the firmware of Intel's 100GbE Ethernet Controller E810, specifically in firmware versions before cvl fw 1.7.8.x. The vulnerability is caused by an uncaught exception within the firmware operating at Ring 0 privilege level on Bare Metal OS platforms. This low complexity attack can be triggered by a system software adversary possessing privileged user access, requiring local access but no user interaction or special internal knowledge. The flaw leads to a denial of service condition, severely impacting the availability of the affected system. Confidentiality and integrity remain unaffected. The vulnerability is rated medium severity with a CVSS 4.0 score of 6.0, reflecting its local attack vector (AV:L), low attack complexity (AC:L), no required authentication (PR:H), no user interaction (UI:N), and high impact on availability (VA:H). No known exploits have been reported in the wild, but the vulnerability poses a risk to environments relying on Intel E810 controllers for high-speed networking, especially in data centers and enterprise bare metal deployments. The lack of patch links suggests that mitigation relies on firmware updates from Intel, specifically upgrading to version 1.7.8.x or later.
Potential Impact
For European organizations, this vulnerability could disrupt critical network infrastructure relying on Intel 100GbE Ethernet Controller E810 hardware, particularly in data centers, cloud providers, and enterprises with high-speed networking needs. The denial of service condition could lead to network outages, degraded performance, or service interruptions impacting business continuity and operational efficiency. While confidentiality and integrity are not compromised, availability impacts can affect customer-facing services, internal communications, and data transfer processes. Organizations with bare metal OS deployments and privileged local users are at higher risk. The medium severity rating indicates a moderate threat level, but the potential for disruption in high-throughput environments elevates the operational risk. Given the local access requirement, insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
European organizations should immediately inventory their network infrastructure to identify Intel 100GbE Ethernet Controller E810 devices running vulnerable firmware versions prior to cvl fw 1.7.8.x. Coordinate with Intel or hardware vendors to obtain and deploy the latest firmware updates that address this vulnerability. Restrict privileged user access to trusted personnel and implement strict access controls to minimize the risk of local exploitation. Employ monitoring and alerting for unusual system software behavior or network disruptions that may indicate attempted exploitation. Consider network segmentation to isolate critical infrastructure and reduce the attack surface. Regularly review and update security policies governing privileged account management and firmware update procedures. Engage with Intel support channels for any additional mitigation guidance or patches. As no user interaction is required, focus on securing local administrative environments and enforcing least privilege principles. Maintain backups and incident response plans to quickly recover from potential denial of service events.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- intel
- Date Reserved
- 2025-03-11T03:00:20.604Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b5d5c4b57a58fa119cf10
Added to database: 2/10/2026, 4:31:24 PM
Last enriched: 2/10/2026, 5:02:45 PM
Last updated: 2/21/2026, 12:22:14 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.