Skip to main content

CVE-2025-26697: Denial of Service in Intel(R) 700 Series Ethernet

Medium
VulnerabilityCVE-2025-26697cvecve-2025-26697
Published: Tue Aug 12 2025 (08/12/2025, 16:59:23 UTC)
Source: CVE Database V5
Product: Intel(R) 700 Series Ethernet

Description

Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.

AI-Powered Analysis

AILast updated: 08/20/2025, 01:45:25 UTC

Technical Analysis

CVE-2025-26697 is a medium-severity vulnerability affecting the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, specifically versions prior to 2.28.5. The flaw involves uncontrolled resource consumption, which can be triggered by an authenticated user with low privileges. This vulnerability does not require user interaction and does not impact confidentiality or integrity but can lead to denial of service (DoS) by exhausting system resources allocated to the network driver. The attack vector is local (AV:L), meaning the attacker must have local access and low privileges (PR:L) on the affected system. The vulnerability does not require elevated privileges or user interaction, and it affects availability by potentially causing the network driver or system to become unresponsive or crash due to resource exhaustion. There are no known exploits in the wild as of the publication date, and no official patches have been linked yet, though upgrading to version 2.28.5 or later is implied to remediate the issue. The vulnerability is specific to Intel 700 Series Ethernet hardware running Linux with the vulnerable driver version, limiting its scope to environments using this hardware and software combination.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns availability of network services on systems using Intel 700 Series Ethernet adapters with the vulnerable Linux driver. Organizations relying on these network interfaces for critical infrastructure, data centers, or enterprise networks could experience service disruptions if an attacker with local access exploits this vulnerability to cause denial of service. This could affect operational continuity, especially in sectors with high availability requirements such as finance, telecommunications, healthcare, and government services. Since exploitation requires authenticated local access, the risk is higher in environments where multiple users have access to systems or where attackers can gain foothold through other means. The vulnerability does not compromise data confidentiality or integrity directly but can degrade network reliability and availability, potentially impacting business operations and service level agreements.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating the Intel 700 Series Ethernet Linux driver to version 2.28.5 or later as soon as it becomes available. Until patches are applied, organizations should restrict local access to systems with vulnerable drivers, enforcing strict access controls and monitoring for unusual resource consumption patterns indicative of exploitation attempts. Network segmentation and limiting user privileges can reduce the attack surface. Additionally, implementing host-based intrusion detection systems (HIDS) to monitor for abnormal driver or network interface behavior can provide early warning. Regular auditing of installed driver versions and maintaining an up-to-date asset inventory will help identify affected systems promptly. For critical systems, consider temporary disabling or replacing vulnerable network adapters if patching is delayed. Finally, educating system administrators about this vulnerability and ensuring timely application of vendor updates is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2025-02-21T04:00:25.939Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689b7751ad5a09ad0034936b

Added to database: 8/12/2025, 5:18:09 PM

Last enriched: 8/20/2025, 1:45:25 AM

Last updated: 8/22/2025, 11:42:08 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats