CVE-2025-26697: Denial of Service in Intel(R) 700 Series Ethernet
Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.
AI Analysis
Technical Summary
CVE-2025-26697 is a medium-severity vulnerability affecting the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, specifically versions prior to 2.28.5. The flaw involves uncontrolled resource consumption, which can be triggered by an authenticated user with low privileges. This vulnerability does not require user interaction and does not impact confidentiality or integrity but can lead to denial of service (DoS) by exhausting system resources allocated to the network driver. The attack vector is local (AV:L), meaning the attacker must have local access and low privileges (PR:L) on the affected system. The vulnerability does not require elevated privileges or user interaction, and it affects availability by potentially causing the network driver or system to become unresponsive or crash due to resource exhaustion. There are no known exploits in the wild as of the publication date, and no official patches have been linked yet, though upgrading to version 2.28.5 or later is implied to remediate the issue. The vulnerability is specific to Intel 700 Series Ethernet hardware running Linux with the vulnerable driver version, limiting its scope to environments using this hardware and software combination.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability of network services on systems using Intel 700 Series Ethernet adapters with the vulnerable Linux driver. Organizations relying on these network interfaces for critical infrastructure, data centers, or enterprise networks could experience service disruptions if an attacker with local access exploits this vulnerability to cause denial of service. This could affect operational continuity, especially in sectors with high availability requirements such as finance, telecommunications, healthcare, and government services. Since exploitation requires authenticated local access, the risk is higher in environments where multiple users have access to systems or where attackers can gain foothold through other means. The vulnerability does not compromise data confidentiality or integrity directly but can degrade network reliability and availability, potentially impacting business operations and service level agreements.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the Intel 700 Series Ethernet Linux driver to version 2.28.5 or later as soon as it becomes available. Until patches are applied, organizations should restrict local access to systems with vulnerable drivers, enforcing strict access controls and monitoring for unusual resource consumption patterns indicative of exploitation attempts. Network segmentation and limiting user privileges can reduce the attack surface. Additionally, implementing host-based intrusion detection systems (HIDS) to monitor for abnormal driver or network interface behavior can provide early warning. Regular auditing of installed driver versions and maintaining an up-to-date asset inventory will help identify affected systems promptly. For critical systems, consider temporary disabling or replacing vulnerable network adapters if patching is delayed. Finally, educating system administrators about this vulnerability and ensuring timely application of vendor updates is essential.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-26697: Denial of Service in Intel(R) 700 Series Ethernet
Description
Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-26697 is a medium-severity vulnerability affecting the Linux kernel-mode driver for Intel(R) 700 Series Ethernet adapters, specifically versions prior to 2.28.5. The flaw involves uncontrolled resource consumption, which can be triggered by an authenticated user with low privileges. This vulnerability does not require user interaction and does not impact confidentiality or integrity but can lead to denial of service (DoS) by exhausting system resources allocated to the network driver. The attack vector is local (AV:L), meaning the attacker must have local access and low privileges (PR:L) on the affected system. The vulnerability does not require elevated privileges or user interaction, and it affects availability by potentially causing the network driver or system to become unresponsive or crash due to resource exhaustion. There are no known exploits in the wild as of the publication date, and no official patches have been linked yet, though upgrading to version 2.28.5 or later is implied to remediate the issue. The vulnerability is specific to Intel 700 Series Ethernet hardware running Linux with the vulnerable driver version, limiting its scope to environments using this hardware and software combination.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability of network services on systems using Intel 700 Series Ethernet adapters with the vulnerable Linux driver. Organizations relying on these network interfaces for critical infrastructure, data centers, or enterprise networks could experience service disruptions if an attacker with local access exploits this vulnerability to cause denial of service. This could affect operational continuity, especially in sectors with high availability requirements such as finance, telecommunications, healthcare, and government services. Since exploitation requires authenticated local access, the risk is higher in environments where multiple users have access to systems or where attackers can gain foothold through other means. The vulnerability does not compromise data confidentiality or integrity directly but can degrade network reliability and availability, potentially impacting business operations and service level agreements.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the Intel 700 Series Ethernet Linux driver to version 2.28.5 or later as soon as it becomes available. Until patches are applied, organizations should restrict local access to systems with vulnerable drivers, enforcing strict access controls and monitoring for unusual resource consumption patterns indicative of exploitation attempts. Network segmentation and limiting user privileges can reduce the attack surface. Additionally, implementing host-based intrusion detection systems (HIDS) to monitor for abnormal driver or network interface behavior can provide early warning. Regular auditing of installed driver versions and maintaining an up-to-date asset inventory will help identify affected systems promptly. For critical systems, consider temporary disabling or replacing vulnerable network adapters if patching is delayed. Finally, educating system administrators about this vulnerability and ensuring timely application of vendor updates is essential.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2025-02-21T04:00:25.939Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b7751ad5a09ad0034936b
Added to database: 8/12/2025, 5:18:09 PM
Last enriched: 8/20/2025, 1:45:25 AM
Last updated: 8/22/2025, 11:42:08 PM
Views: 5
Related Threats
CVE-2025-9788: SQL Injection in SourceCodester School Log Management System
MediumCVE-2025-57799: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemon8866 StreamVault
HighCVE-2025-55007: CWE-918: Server-Side Request Forgery (SSRF) in KnowageLabs Knowage-Server
LowCVE-2025-9786: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-9783: Buffer Overflow in TOTOLINK A702R
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.