CVE-2025-25058: Information Disclosure in Intel(R) Ethernet 800-Series
Improper initialization for some ESXi kernel mode driver for the Intel(R) Ethernet 800-Series before version 2.2.2.0 (esxi 8.0) & 2.2.3.0 (esxi 9.0) within Ring 1: Device Drivers may allow an information disclosure. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
AI Analysis
Technical Summary
CVE-2025-25058 is a vulnerability identified in the Intel(R) Ethernet 800-Series network interface card (NIC) drivers used within VMware ESXi hypervisor environments, specifically versions before 2.2.2.0 for ESXi 8.0 and 2.2.3.0 for ESXi 9.0. The flaw arises from improper initialization within the ESXi kernel mode driver operating at Ring 1 (device driver level), which can lead to unintended information disclosure. An attacker with low privileges but authenticated access to the host system can exploit this vulnerability locally without requiring user interaction or special internal knowledge. The attack vector is local, with low complexity, meaning it does not require sophisticated techniques or elevated privileges beyond authenticated user status. The vulnerability primarily affects confidentiality by potentially exposing sensitive data residing in memory or buffers managed by the driver. However, it does not compromise system integrity or availability, nor does it lead to privilege escalation or remote code execution. The CVSS v4.0 score is 2.0, reflecting a low severity level due to limited impact and exploitation scope. No public exploits have been reported to date. This vulnerability is relevant in virtualized environments where Intel Ethernet 800-Series NICs are deployed with affected ESXi versions, potentially exposing sensitive information to malicious insiders or compromised accounts.
Potential Impact
For European organizations, the impact of CVE-2025-25058 is primarily related to confidentiality risks within virtualized infrastructure environments using VMware ESXi hypervisors with Intel Ethernet 800-Series NICs. Although the severity is low, sensitive data leakage could occur if an attacker gains authenticated local access, which might be possible through compromised credentials or insider threats. This could affect organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and government agencies. Since the vulnerability does not affect integrity or availability, operational disruption is unlikely. However, any data exposure could lead to compliance issues under GDPR if personal or sensitive data is involved. The low complexity and lack of required user interaction increase the risk that an insider or attacker with limited privileges could exploit this vulnerability. Organizations relying heavily on ESXi virtualization with Intel Ethernet 800-Series hardware should consider the confidentiality implications and address the vulnerability promptly to prevent potential data leaks.
Mitigation Recommendations
To mitigate CVE-2025-25058, European organizations should: 1) Apply the latest patches and updates from Intel and VMware for the Intel Ethernet 800-Series drivers and ESXi versions, specifically upgrading to versions 2.2.2.0 or later for ESXi 8.0 and 2.2.3.0 or later for ESXi 9.0. 2) Restrict and monitor authenticated local access to ESXi hosts, enforcing strict access controls and multi-factor authentication to reduce the risk of unauthorized exploitation. 3) Implement robust credential management and monitoring to detect potential insider threats or compromised accounts. 4) Conduct regular security audits and vulnerability scans on virtualized infrastructure to identify outdated drivers or hypervisor versions. 5) Use network segmentation and least privilege principles to limit exposure of ESXi hosts and their management interfaces. 6) Employ host-based intrusion detection systems to monitor for suspicious activities on ESXi hosts. These steps go beyond generic advice by focusing on patch management, access control, and monitoring tailored to the virtualization environment and hardware involved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-25058: Information Disclosure in Intel(R) Ethernet 800-Series
Description
Improper initialization for some ESXi kernel mode driver for the Intel(R) Ethernet 800-Series before version 2.2.2.0 (esxi 8.0) & 2.2.3.0 (esxi 9.0) within Ring 1: Device Drivers may allow an information disclosure. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
AI-Powered Analysis
Technical Analysis
CVE-2025-25058 is a vulnerability identified in the Intel(R) Ethernet 800-Series network interface card (NIC) drivers used within VMware ESXi hypervisor environments, specifically versions before 2.2.2.0 for ESXi 8.0 and 2.2.3.0 for ESXi 9.0. The flaw arises from improper initialization within the ESXi kernel mode driver operating at Ring 1 (device driver level), which can lead to unintended information disclosure. An attacker with low privileges but authenticated access to the host system can exploit this vulnerability locally without requiring user interaction or special internal knowledge. The attack vector is local, with low complexity, meaning it does not require sophisticated techniques or elevated privileges beyond authenticated user status. The vulnerability primarily affects confidentiality by potentially exposing sensitive data residing in memory or buffers managed by the driver. However, it does not compromise system integrity or availability, nor does it lead to privilege escalation or remote code execution. The CVSS v4.0 score is 2.0, reflecting a low severity level due to limited impact and exploitation scope. No public exploits have been reported to date. This vulnerability is relevant in virtualized environments where Intel Ethernet 800-Series NICs are deployed with affected ESXi versions, potentially exposing sensitive information to malicious insiders or compromised accounts.
Potential Impact
For European organizations, the impact of CVE-2025-25058 is primarily related to confidentiality risks within virtualized infrastructure environments using VMware ESXi hypervisors with Intel Ethernet 800-Series NICs. Although the severity is low, sensitive data leakage could occur if an attacker gains authenticated local access, which might be possible through compromised credentials or insider threats. This could affect organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and government agencies. Since the vulnerability does not affect integrity or availability, operational disruption is unlikely. However, any data exposure could lead to compliance issues under GDPR if personal or sensitive data is involved. The low complexity and lack of required user interaction increase the risk that an insider or attacker with limited privileges could exploit this vulnerability. Organizations relying heavily on ESXi virtualization with Intel Ethernet 800-Series hardware should consider the confidentiality implications and address the vulnerability promptly to prevent potential data leaks.
Mitigation Recommendations
To mitigate CVE-2025-25058, European organizations should: 1) Apply the latest patches and updates from Intel and VMware for the Intel Ethernet 800-Series drivers and ESXi versions, specifically upgrading to versions 2.2.2.0 or later for ESXi 8.0 and 2.2.3.0 or later for ESXi 9.0. 2) Restrict and monitor authenticated local access to ESXi hosts, enforcing strict access controls and multi-factor authentication to reduce the risk of unauthorized exploitation. 3) Implement robust credential management and monitoring to detect potential insider threats or compromised accounts. 4) Conduct regular security audits and vulnerability scans on virtualized infrastructure to identify outdated drivers or hypervisor versions. 5) Use network segmentation and least privilege principles to limit exposure of ESXi hosts and their management interfaces. 6) Employ host-based intrusion detection systems to monitor for suspicious activities on ESXi hosts. These steps go beyond generic advice by focusing on patch management, access control, and monitoring tailored to the virtualization environment and hardware involved.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- intel
- Date Reserved
- 2025-02-04T04:00:22.208Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b5d5c4b57a58fa119cf13
Added to database: 2/10/2026, 4:31:24 PM
Last enriched: 2/18/2026, 10:07:56 AM
Last updated: 2/21/2026, 2:19:16 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.